Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-0732 (GCVE-0-2018-0732)
Vulnerability from cvelistv5 – Published: 2018-06-12 13:00 – Updated: 2024-09-17 02:11- Client side Denial of Service
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:35:49.303Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"
},
{
"name": "104442",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/104442"
},
{
"name": "DSA-4355",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"name": "RHSA-2018:2552",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
},
{
"name": "GLSA-201811-03",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201811-03"
},
{
"name": "USN-3692-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3692-2/"
},
{
"name": "RHSA-2018:2553",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
},
{
"name": "RHSA-2018:3505",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name": "USN-3692-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3692-1/"
},
{
"name": "RHSA-2018:3221",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name": "DSA-4348",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name": "1041090",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1041090"
},
{
"name": "RHSA-2019:1297",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"name": "RHSA-2019:1296",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
},
{
"name": "RHSA-2019:1543",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"name": "FEDORA-2019-db06efdea1",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/"
},
{
"name": "FEDORA-2019-00c25b9379",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/"
},
{
"name": "FEDORA-2019-9a0a7c0986",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2018-14"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2018-13"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2018-12"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20181105-0001/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.openssl.org/news/secadv/20180612.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "OpenSSL",
"vendor": "OpenSSL",
"versions": [
{
"status": "affected",
"version": "Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)"
},
{
"status": "affected",
"version": "Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Guido Vranken"
}
],
"datePublic": "2018-06-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)."
}
],
"metrics": [
{
"other": {
"content": {
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"value": "Low"
},
"type": "unknown"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Client side Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-08T11:06:25.000Z",
"orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5",
"shortName": "openssl"
},
"references": [
{
"name": "[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"
},
{
"name": "104442",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/104442"
},
{
"name": "DSA-4355",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"name": "RHSA-2018:2552",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
},
{
"name": "GLSA-201811-03",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201811-03"
},
{
"name": "USN-3692-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3692-2/"
},
{
"name": "RHSA-2018:2553",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
},
{
"name": "RHSA-2018:3505",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name": "USN-3692-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3692-1/"
},
{
"name": "RHSA-2018:3221",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name": "DSA-4348",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name": "1041090",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1041090"
},
{
"name": "RHSA-2019:1297",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"name": "RHSA-2019:1296",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
},
{
"name": "RHSA-2019:1543",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"name": "FEDORA-2019-db06efdea1",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/"
},
{
"name": "FEDORA-2019-00c25b9379",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/"
},
{
"name": "FEDORA-2019-9a0a7c0986",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tenable.com/security/tns-2018-14"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tenable.com/security/tns-2018-13"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tenable.com/security/tns-2018-12"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20181105-0001/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.openssl.org/news/secadv/20180612.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf"
}
],
"title": "Client DoS due to large DH parameter",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2018-06-12",
"ID": "CVE-2018-0732",
"STATE": "PUBLIC",
"TITLE": "Client DoS due to large DH parameter"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value": "Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)"
},
{
"version_value": "Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)"
}
]
}
}
]
},
"vendor_name": "OpenSSL"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Guido Vranken"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)."
}
]
},
"impact": [
{
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"value": "Low"
}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Client side Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"
},
{
"name": "104442",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104442"
},
{
"name": "DSA-4355",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"name": "RHSA-2018:2552",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
},
{
"name": "GLSA-201811-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-03"
},
{
"name": "USN-3692-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-2/"
},
{
"name": "RHSA-2018:2553",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
},
{
"name": "RHSA-2018:3505",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name": "USN-3692-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-1/"
},
{
"name": "RHSA-2018:3221",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name": "DSA-4348",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name": "1041090",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041090"
},
{
"name": "RHSA-2019:1297",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"name": "RHSA-2019:1296",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
},
{
"name": "RHSA-2019:1543",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"name": "FEDORA-2019-db06efdea1",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/"
},
{
"name": "FEDORA-2019-00c25b9379",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/"
},
{
"name": "FEDORA-2019-9a0a7c0986",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"name": "https://www.tenable.com/security/tns-2018-14",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-14"
},
{
"name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
"refsource": "CONFIRM",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
},
{
"name": "https://www.tenable.com/security/tns-2018-13",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-13"
},
{
"name": "https://www.tenable.com/security/tns-2018-17",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"name": "https://www.tenable.com/security/tns-2018-12",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-12"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181105-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181105-0001/"
},
{
"name": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098"
},
{
"name": "https://www.openssl.org/news/secadv/20180612.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190118-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5",
"assignerShortName": "openssl",
"cveId": "CVE-2018-0732",
"datePublished": "2018-06-12T13:00:00.000Z",
"dateReserved": "2017-11-30T00:00:00.000Z",
"dateUpdated": "2024-09-17T02:11:18.325Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0.2\", \"versionEndIncluding\": \"1.0.2o\", \"matchCriteriaId\": \"5DADB202-4A40-4A12-9CEA-F7BD4529F002\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.1.0\", \"versionEndIncluding\": \"1.1.0h\", \"matchCriteriaId\": \"BF986111-5DDB-4BC8-AF03-14626778AB23\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"8D305F7A-D159-4716-AB26-5E38BB5CD991\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9070C9D8-A14A-467F-8253-33B966C16886\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"6.0.0\", \"versionEndExcluding\": \"6.8.1\", \"matchCriteriaId\": \"344E262B-2C2F-42B4-B6BF-56ECC9792F37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"6.9.0\", \"versionEndExcluding\": \"6.14.4\", \"matchCriteriaId\": \"2D7B18CD-B613-47B1-84AB-E63CC8C217C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"8.0.0\", \"versionEndExcluding\": \"8.8.1\", \"matchCriteriaId\": \"F2A7041F-CF80-4FB3-9A45-1C454BEFF0D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"8.9.0\", \"versionEndExcluding\": \"8.11.4\", \"matchCriteriaId\": \"2F1E356E-A599-4741-BD5C-B6CD8C23F8F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"10.0.0\", \"versionEndExcluding\": \"10.9.0\", \"matchCriteriaId\": \"BD090ABA-35A0-4884-B811-F2681DCDE777\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).\"}, {\"lang\": \"es\", \"value\": \"Durante los acuerdos de clave en un handshake TLS mediante un conjunto de cifrado basado en DH(E), un servidor malicioso puede enviar un valor primo muy grande al cliente. Esto provocar\\u00e1 que el cliente gaste una cantidad de tiempo demasiado grande generando una clave para este primo, lo que resulta en un bloqueo hasta que termine el cliente. Esto podr\\u00eda explotarse en un ataque de Denegaci\\u00f3n de servicio (DoS). Se ha solucionado en OpenSSL 1.1.0i-dev (afecta a 1.1.0-1.1.0h). Se ha solucionado en OpenSSL 1.0.2p-dev (afecta a 1.0.2-1.0.2o).\"}]",
"id": "CVE-2018-0732",
"lastModified": "2024-11-21T03:38:49.630",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-06-12T13:29:00.207",
"references": "[{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/104442\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1041090\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2552\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2553\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3221\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3505\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1296\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1297\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1543\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201811-03\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20181105-0001/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190118-0002/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://securityadvisories.paloaltonetworks.com/Home/Detail/133\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3692-1/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3692-2/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4348\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4355\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.openssl.org/news/secadv/20180612.txt\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2020.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2018-12\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2018-13\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2018-14\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2018-17\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/104442\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1041090\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2552\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2553\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3221\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3505\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1296\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1297\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1543\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201811-03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20181105-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190118-0002/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://securityadvisories.paloaltonetworks.com/Home/Detail/133\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3692-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3692-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4348\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4355\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.openssl.org/news/secadv/20180612.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2018-12\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2018-13\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2018-14\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2018-17\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "openssl-security@openssl.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-320\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-0732\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2018-06-12T13:29:00.207\",\"lastModified\":\"2024-11-21T03:38:49.630\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).\"},{\"lang\":\"es\",\"value\":\"Durante los acuerdos de clave en un handshake TLS mediante un conjunto de cifrado basado en DH(E), un servidor malicioso puede enviar un valor primo muy grande al cliente. Esto provocar\u00e1 que el cliente gaste una cantidad de tiempo demasiado grande generando una clave para este primo, lo que resulta en un bloqueo hasta que termine el cliente. Esto podr\u00eda explotarse en un ataque de Denegaci\u00f3n de servicio (DoS). Se ha solucionado en OpenSSL 1.1.0i-dev (afecta a 1.1.0-1.1.0h). Se ha solucionado en OpenSSL 1.0.2p-dev (afecta a 1.0.2-1.0.2o).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-320\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.2\",\"versionEndIncluding\":\"1.0.2o\",\"matchCriteriaId\":\"5DADB202-4A40-4A12-9CEA-F7BD4529F002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0\",\"versionEndIncluding\":\"1.1.0h\",\"matchCriteriaId\":\"BF986111-5DDB-4BC8-AF03-14626778AB23\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.8.1\",\"matchCriteriaId\":\"344E262B-2C2F-42B4-B6BF-56ECC9792F37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"6.9.0\",\"versionEndExcluding\":\"6.14.4\",\"matchCriteriaId\":\"2D7B18CD-B613-47B1-84AB-E63CC8C217C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.8.1\",\"matchCriteriaId\":\"F2A7041F-CF80-4FB3-9A45-1C454BEFF0D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"8.9.0\",\"versionEndExcluding\":\"8.11.4\",\"matchCriteriaId\":\"2F1E356E-A599-4741-BD5C-B6CD8C23F8F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.9.0\",\"matchCriteriaId\":\"BD090ABA-35A0-4884-B811-F2681DCDE777\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104442\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041090\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2552\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2553\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3221\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3505\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1296\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1297\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1543\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201811-03\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20181105-0001/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190118-0002/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://securityadvisories.paloaltonetworks.com/Home/Detail/133\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3692-1/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3692-2/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4348\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4355\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20180612.txt\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2018-12\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2018-13\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2018-14\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2018-17\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2552\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2553\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3505\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1296\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1543\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201811-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20181105-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190118-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://securityadvisories.paloaltonetworks.com/Home/Detail/133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3692-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3692-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4355\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20180612.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2018-12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2018-13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2018-14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2018-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2019-AVI-510
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers, versions ant\u00e9rieures \u00e0 XCP2361 et ant\u00e9rieures \u00e0 XCP3071",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris versions 10 et 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-3008",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3008"
},
{
"name": "CVE-2019-6109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6109"
},
{
"name": "CVE-2019-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2961"
},
{
"name": "CVE-2015-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5180"
},
{
"name": "CVE-2019-3010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3010"
},
{
"name": "CVE-2019-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2765"
},
{
"name": "CVE-2018-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7185"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-510",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2019-5072832 du 15 octobre 2019",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html#AppendixSUNS"
}
]
}
CERTFR-2019-AVI-014
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | SRC Series Application Server et Web Administrator versions antérieures à 4.12.0-R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 sur vMX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75 | ||
| N/A | N/A | Juniper ATP | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series | ||
| Juniper Networks | Junos Space | Junos Space | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series | ||
| Juniper Networks | Junos OS | Tous produits et toutes plateformes exécutant Junos OS | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SRC Series Application Server et Web Administrator versions ant\u00e9rieures \u00e0 4.12.0-R1",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 sur vMX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper ATP",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Tous produits et toutes plateformes ex\u00e9cutant Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0010"
},
{
"name": "CVE-2018-10901",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2019-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0003"
},
{
"name": "CVE-2019-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0007"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2019-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0027"
},
{
"name": "CVE-2019-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0030"
},
{
"name": "CVE-2017-1000379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379"
},
{
"name": "CVE-2019-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0001"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2019-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0002"
},
{
"name": "CVE-2019-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0013"
},
{
"name": "CVE-2019-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0023"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3137"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2017-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
},
{
"name": "CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"name": "CVE-2019-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0015"
},
{
"name": "CVE-2019-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0005"
},
{
"name": "CVE-2019-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0009"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2019-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0024"
},
{
"name": "CVE-2019-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0025"
},
{
"name": "CVE-2017-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2019-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0011"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2019-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0012"
},
{
"name": "CVE-2017-11610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
},
{
"name": "CVE-2018-5748",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5748"
},
{
"name": "CVE-2019-0004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0004"
},
{
"name": "CVE-2019-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0017"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0021"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2019-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0016"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2019-0022",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0022"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-1050",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1050"
},
{
"name": "CVE-2019-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0014"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
},
{
"name": "CVE-2018-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10911"
},
{
"name": "CVE-2019-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0026"
},
{
"name": "CVE-2019-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0029"
},
{
"name": "CVE-2019-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0020"
},
{
"name": "CVE-2018-5740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5740"
},
{
"name": "CVE-2017-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2619"
},
{
"name": "CVE-2019-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0018"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2019-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0006"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2017-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3136"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2017-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-10301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10301"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-014",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10906 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10906\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10910 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10910\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10911 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10911\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10907 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10907\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10912 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10912\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10913 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10913\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10919 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10919\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10905 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10905\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10902 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10902\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10917 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10904 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10904\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10915 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10915\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10916 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10916\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10914 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10914\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10900 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10900\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10909 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10909\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10901 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10901\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10918 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10918\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10903 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10903\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-497
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Virtualization. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Virtualization | Oracle VM VirtualBox versions antérieures à 5.2.20 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 5.2.20",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3289",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3289"
},
{
"name": "CVE-2018-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3296"
},
{
"name": "CVE-2018-3298",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3298"
},
{
"name": "CVE-2018-2909",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2909"
},
{
"name": "CVE-2018-3287",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3287"
},
{
"name": "CVE-2018-3294",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3294"
},
{
"name": "CVE-2018-3292",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3292"
},
{
"name": "CVE-2018-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3297"
},
{
"name": "CVE-2018-3291",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3291"
},
{
"name": "CVE-2018-3293",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3293"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-3295",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3295"
},
{
"name": "CVE-2018-3290",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3290"
},
{
"name": "CVE-2018-3288",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3288"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-497",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle\nVirtualization. Elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Virtualization",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2018verbose du 16 octobre 2018",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2018verbose-5170927.html#OVIR"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 16 octobre 2018",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}
]
}
CERTFR-2021-AVI-442
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC NET CP 443-1 OPC UA toutes versions | ||
| Siemens | N/A | Solid Edge SE2021 versions antérieures à SE2021MP5 | ||
| Siemens | N/A | Mendix SAML Module versions antérieures à V2.1.2 | ||
| Siemens | N/A | TIM 1531 IRC (incl. SIPLUS NET variants) versions antérieures à V2.2 | ||
| Siemens | N/A | Simcenter Femap 2021.1 versions antérieures à V2021.1.MP3 | ||
| Siemens | N/A | T2Go et Teamcenter Visualization versions antérieures à V13.1.0.3 | ||
| Siemens | N/A | SIMATIC RF360R, RF615R, RF680R et RF685R | ||
| Siemens | N/A | Solid Edge SE2020 versions antérieures à 2020MP14 | ||
| Siemens | N/A | Simcenter Femap 2020.2 versions antérieures à V2020.2.MP3 | ||
| Siemens | N/A | SIMATIC RF166C, RF185C, RF186C, RF186CI, RF188C et RF188CI versions antérieures à V1.3.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC NET CP 443-1 OPC UA toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2021 versions ant\u00e9rieures \u00e0 SE2021MP5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML Module versions ant\u00e9rieures \u00e0 V2.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC (incl. SIPLUS NET variants) versions ant\u00e9rieures \u00e0 V2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Simcenter Femap 2021.1 versions ant\u00e9rieures \u00e0 V2021.1.MP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "T2Go et Teamcenter Visualization versions ant\u00e9rieures \u00e0 V13.1.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF360R, RF615R, RF680R et RF685R",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2020 versions ant\u00e9rieures \u00e0 2020MP14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Simcenter Femap 2020.2 versions ant\u00e9rieures \u00e0 V2020.2.MP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF166C, RF185C, RF186C, RF186CI, RF188C et RF188CI versions ant\u00e9rieures \u00e0 V1.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1547"
},
{
"name": "CVE-2016-4956",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4956"
},
{
"name": "CVE-2021-33712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33712"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2016-4953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4953"
},
{
"name": "CVE-2021-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27399"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2016-1550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1550"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2021-31343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31343"
},
{
"name": "CVE-2016-7433",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7433"
},
{
"name": "CVE-2016-4955",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4955"
},
{
"name": "CVE-2015-7853",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7853"
},
{
"name": "CVE-2015-8138",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8138"
},
{
"name": "CVE-2016-4954",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4954"
},
{
"name": "CVE-2021-27387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27387"
},
{
"name": "CVE-2021-31342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31342"
},
{
"name": "CVE-2016-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2518"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2016-7431",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7431"
},
{
"name": "CVE-2021-31340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31340"
},
{
"name": "CVE-2021-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27390"
},
{
"name": "CVE-2017-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6458"
},
{
"name": "CVE-2016-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1548"
},
{
"name": "CVE-2016-9042",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9042"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-442",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-208356 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-208356.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-645530 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-645530.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-200951 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419820 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-133038 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-133038.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-787292 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-787292.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-522654 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-522654.pdf"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2020-AVI-015
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper Networks SBR Carrier versions 8.5.x antérieures à 8.5.0R4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D12 sur séries QFX5100 et EX4600 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à R1912 | ||
| Juniper Networks | N/A | Juniper Networks SBR Carrier versions antérieures à 8.4.1R19 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 19.4R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur séries MX | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur série EX4300 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D52 sur séries QFX3500 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks SBR Carrier versions 8.5.x ant\u00e9rieures \u00e0 8.5.0R4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D12 sur s\u00e9ries QFX5100 et EX4600",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 R1912",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks SBR Carrier versions ant\u00e9rieures \u00e0 8.4.1R19",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 19.4R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur s\u00e9ries MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur s\u00e9rie EX4300",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D52 sur s\u00e9ries QFX3500",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2020-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1611"
},
{
"name": "CVE-2018-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1336"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2018-5743",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5743"
},
{
"name": "CVE-2014-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2310"
},
{
"name": "CVE-2018-9568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9568"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-11810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11810"
},
{
"name": "CVE-2020-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1606"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2020-1608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1608"
},
{
"name": "CVE-2020-1602",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1602"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2019-19919",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19919"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2018-17972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17972"
},
{
"name": "CVE-2008-6123",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6123"
},
{
"name": "CVE-2020-1601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1601"
},
{
"name": "CVE-2017-2595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2595"
},
{
"name": "CVE-2016-7061",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7061"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2017-12174",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12174"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2020-1607",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1607"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2020-1604",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1604"
},
{
"name": "CVE-2016-7055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7055"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2020-1603",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1603"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2014-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3565"
},
{
"name": "CVE-2020-1609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1609"
},
{
"name": "CVE-2020-1605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1605"
},
{
"name": "CVE-2020-1600",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1600"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-015",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10992 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10992\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10986 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10986\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10985 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10985\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10980 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10980\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10981 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10981\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10983 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10983\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10979 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10979\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10987 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10987\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10982 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10982\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10990 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10990\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10991 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10991\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10993 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10993\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-510
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers, versions ant\u00e9rieures \u00e0 XCP2361 et ant\u00e9rieures \u00e0 XCP3071",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris versions 10 et 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-3008",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3008"
},
{
"name": "CVE-2019-6109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6109"
},
{
"name": "CVE-2019-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2961"
},
{
"name": "CVE-2015-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5180"
},
{
"name": "CVE-2019-3010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3010"
},
{
"name": "CVE-2019-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2765"
},
{
"name": "CVE-2018-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7185"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-510",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2019-5072832 du 15 octobre 2019",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html#AppendixSUNS"
}
]
}
CERTFR-2019-AVI-325
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Junos Space versions antérieures à 19.2R1 | ||
| Juniper Networks | Secure Analytics | Juniper Secure Analytics (JSA) versions antérieures à 7.3.2 Patch 1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S13, 12.3X48-D80, 12.3X48-D85, 12.3X48-D90, 14.1X53-D130, 14.1X53-D49, 14.1X53-D51, 15.1F6-S12, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X49-D171, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X53-D237, 15.1X53-D238, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69, 16.1R3-S11, 16.1R7-S3, 16.1R7-S4, 16.1R7-S5, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3, 17.2R3-S1, 17.2X75-D105, 17.3R3-S2, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R1-S8, 17.4R2-S2, 17.4R2-S3, 17.4R2-S4, 17.4R2-S5, 17.4R3, 18.1R2-S4, 18.1R3-S2, 18.1R3-S3, 18.1R3-S5, 18.1R3-S6, 18.2R1-S5, 18.2R2, 18.2R2-S1, 18.2R2-S2, 18.2R2-S3, 18.2R3, 18.2X75-D12, 18.2X75-D30, 18.2X75-D40, 18.2X75-D50, 18.3R1-S2, 18.3R1-S3, 18.3R1-S4, 18.3R2, 18.4R1, 18.4R1-S1, 18.4R1-S2, 18.4R2, 19.1R1, 19.1R1-S1, 19.1R2 et 19.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D115, 14.1X53-D51, 16.1R7-S5, 17.1R3, 17.2R3, 17.2R3-S2, 17.3R3-S2, 17.3R3-S3, 17.4R2, 17.4R2-S5, 17.4R3, 18.1R3, 18.1R3-S1, 18.2R2, 18.3R1, 18.3R2 et 18.4R1 sur séries EX4300 | ||
| Juniper Networks | N/A | Junos OS avec J-Web activé versions antérieures à 12.3R12-S14, 12.3X48-D80, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X53-D497, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3, 17.2R2-S7, 17.2R3-S1, 17.3R3-S5, 17.4R1-S7, 17.4R2-S4, 17.4R3, 18.1R3-S5 et 18.2R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 19.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Secure Analytics (JSA) versions ant\u00e9rieures \u00e0 7.3.2 Patch 1",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S13, 12.3X48-D80, 12.3X48-D85, 12.3X48-D90, 14.1X53-D130, 14.1X53-D49, 14.1X53-D51, 15.1F6-S12, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X49-D171, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X53-D237, 15.1X53-D238, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69, 16.1R3-S11, 16.1R7-S3, 16.1R7-S4, 16.1R7-S5, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3, 17.2R3-S1, 17.2X75-D105, 17.3R3-S2, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R1-S8, 17.4R2-S2, 17.4R2-S3, 17.4R2-S4, 17.4R2-S5, 17.4R3, 18.1R2-S4, 18.1R3-S2, 18.1R3-S3, 18.1R3-S5, 18.1R3-S6, 18.2R1-S5, 18.2R2, 18.2R2-S1, 18.2R2-S2, 18.2R2-S3, 18.2R3, 18.2X75-D12, 18.2X75-D30, 18.2X75-D40, 18.2X75-D50, 18.3R1-S2, 18.3R1-S3, 18.3R1-S4, 18.3R2, 18.4R1, 18.4R1-S1, 18.4R1-S2, 18.4R2, 19.1R1, 19.1R1-S1, 19.1R2 et 19.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D115, 14.1X53-D51, 16.1R7-S5, 17.1R3, 17.2R3, 17.2R3-S2, 17.3R3-S2, 17.3R3-S3, 17.4R2, 17.4R2-S5, 17.4R3, 18.1R3, 18.1R3-S1, 18.2R2, 18.3R1, 18.3R2 et 18.4R1 sur s\u00e9ries EX4300",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS avec J-Web activ\u00e9 versions ant\u00e9rieures \u00e0 12.3R12-S14, 12.3X48-D80, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X53-D497, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3, 17.2R2-S7, 17.2R3-S1, 17.3R3-S5, 17.4R1-S7, 17.4R2-S4, 17.4R3, 18.1R3-S5 et 18.2R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-8615",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8615"
},
{
"name": "CVE-2019-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0049"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2016-8619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
},
{
"name": "CVE-2018-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15505"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-10902",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10902"
},
{
"name": "CVE-2019-0048",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0048"
},
{
"name": "CVE-2016-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8624"
},
{
"name": "CVE-2016-8616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8616"
},
{
"name": "CVE-2016-8620",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8620"
},
{
"name": "CVE-2016-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8617"
},
{
"name": "CVE-2019-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0053"
},
{
"name": "CVE-2016-8618",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
},
{
"name": "CVE-2019-5739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5739"
},
{
"name": "CVE-2019-0052",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0052"
},
{
"name": "CVE-2016-8623",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8623"
},
{
"name": "CVE-2019-0046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0046"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-11237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11237"
},
{
"name": "CVE-2016-8621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8621"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2018-15504",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15504"
},
{
"name": "CVE-2016-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2018-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1729"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-325",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10938 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10938\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10946 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10946\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10942 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10942\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10949 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10949\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10943 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10943\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10951 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10951\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10950 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10950\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10948 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10948\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10947 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10947\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-014
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | SRC Series Application Server et Web Administrator versions antérieures à 4.12.0-R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 sur vMX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75 | ||
| N/A | N/A | Juniper ATP | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series | ||
| Juniper Networks | Junos Space | Junos Space | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series | ||
| Juniper Networks | Junos OS | Tous produits et toutes plateformes exécutant Junos OS | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SRC Series Application Server et Web Administrator versions ant\u00e9rieures \u00e0 4.12.0-R1",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 sur vMX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper ATP",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Tous produits et toutes plateformes ex\u00e9cutant Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0010"
},
{
"name": "CVE-2018-10901",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2019-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0003"
},
{
"name": "CVE-2019-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0007"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2019-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0027"
},
{
"name": "CVE-2019-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0030"
},
{
"name": "CVE-2017-1000379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379"
},
{
"name": "CVE-2019-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0001"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2019-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0002"
},
{
"name": "CVE-2019-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0013"
},
{
"name": "CVE-2019-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0023"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3137"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2017-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
},
{
"name": "CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"name": "CVE-2019-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0015"
},
{
"name": "CVE-2019-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0005"
},
{
"name": "CVE-2019-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0009"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2019-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0024"
},
{
"name": "CVE-2019-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0025"
},
{
"name": "CVE-2017-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2019-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0011"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2019-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0012"
},
{
"name": "CVE-2017-11610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
},
{
"name": "CVE-2018-5748",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5748"
},
{
"name": "CVE-2019-0004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0004"
},
{
"name": "CVE-2019-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0017"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0021"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2019-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0016"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2019-0022",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0022"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-1050",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1050"
},
{
"name": "CVE-2019-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0014"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
},
{
"name": "CVE-2018-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10911"
},
{
"name": "CVE-2019-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0026"
},
{
"name": "CVE-2019-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0029"
},
{
"name": "CVE-2019-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0020"
},
{
"name": "CVE-2018-5740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5740"
},
{
"name": "CVE-2017-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2619"
},
{
"name": "CVE-2019-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0018"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2019-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0006"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2017-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3136"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2017-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-10301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10301"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-014",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10906 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10906\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10910 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10910\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10911 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10911\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10907 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10907\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10912 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10912\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10913 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10913\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10919 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10919\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10905 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10905\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10902 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10902\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10917 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10904 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10904\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10915 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10915\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10916 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10916\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10914 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10914\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10900 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10900\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10909 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10909\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10901 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10901\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10918 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10918\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10903 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10903\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2020-AVI-015
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper Networks SBR Carrier versions 8.5.x antérieures à 8.5.0R4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D12 sur séries QFX5100 et EX4600 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à R1912 | ||
| Juniper Networks | N/A | Juniper Networks SBR Carrier versions antérieures à 8.4.1R19 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 19.4R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur séries MX | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur série EX4300 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D52 sur séries QFX3500 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks SBR Carrier versions 8.5.x ant\u00e9rieures \u00e0 8.5.0R4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D12 sur s\u00e9ries QFX5100 et EX4600",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 R1912",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks SBR Carrier versions ant\u00e9rieures \u00e0 8.4.1R19",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 19.4R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur s\u00e9ries MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur s\u00e9rie EX4300",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D52 sur s\u00e9ries QFX3500",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2020-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1611"
},
{
"name": "CVE-2018-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1336"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2018-5743",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5743"
},
{
"name": "CVE-2014-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2310"
},
{
"name": "CVE-2018-9568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9568"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-11810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11810"
},
{
"name": "CVE-2020-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1606"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2020-1608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1608"
},
{
"name": "CVE-2020-1602",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1602"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2019-19919",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19919"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2018-17972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17972"
},
{
"name": "CVE-2008-6123",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6123"
},
{
"name": "CVE-2020-1601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1601"
},
{
"name": "CVE-2017-2595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2595"
},
{
"name": "CVE-2016-7061",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7061"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2017-12174",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12174"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2020-1607",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1607"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2020-1604",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1604"
},
{
"name": "CVE-2016-7055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7055"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2020-1603",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1603"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2014-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3565"
},
{
"name": "CVE-2020-1609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1609"
},
{
"name": "CVE-2020-1605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1605"
},
{
"name": "CVE-2020-1600",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1600"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-015",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10992 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10992\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10986 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10986\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10985 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10985\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10980 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10980\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10981 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10981\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10983 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10983\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10979 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10979\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10987 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10987\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10982 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10982\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10990 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10990\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10991 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10991\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10993 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10993\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-025
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Connectors versions 2.1.8 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 8.0.13 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 5.7.24 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 4.0.7 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 8.0.13 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 8.0.13 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.13 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 5.6.42 et antérieures |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Connectors versions 2.1.8 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.0.13 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 5.7.24 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 4.0.7 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.13 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 8.0.13 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.13 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 5.6.42 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-2529",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2529"
},
{
"name": "CVE-2019-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2510"
},
{
"name": "CVE-2018-10933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10933"
},
{
"name": "CVE-2019-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2420"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2486"
},
{
"name": "CVE-2019-2434",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2434"
},
{
"name": "CVE-2019-2528",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2528"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2532"
},
{
"name": "CVE-2019-2537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2537"
},
{
"name": "CVE-2019-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2481"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2531"
},
{
"name": "CVE-2019-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2503"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2534"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2482"
},
{
"name": "CVE-2019-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2455"
},
{
"name": "CVE-2019-2507",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2507"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-025",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2019-5072801 du 15 janvier 2019",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixMSQL"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2019verbose-5072807 du 15 janvier 2019",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019verbose-5072807.html#MSQL"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-511
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits Tenable. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "LCE versions ant\u00e9rieures \u00e0 5.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Nessus versions ant\u00e9rieures \u00e0 8.0.0",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-511",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Tenable. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Tenable",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2018-13 du 23 octobre 2018",
"url": "https://www.tenable.com/security/tns-2018-13"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2018-14 du 23 octobre 2018",
"url": "https://www.tenable.com/security/tns-2018-14"
}
]
}
CERTFR-2021-AVI-442
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC NET CP 443-1 OPC UA toutes versions | ||
| Siemens | N/A | Solid Edge SE2021 versions antérieures à SE2021MP5 | ||
| Siemens | N/A | Mendix SAML Module versions antérieures à V2.1.2 | ||
| Siemens | N/A | TIM 1531 IRC (incl. SIPLUS NET variants) versions antérieures à V2.2 | ||
| Siemens | N/A | Simcenter Femap 2021.1 versions antérieures à V2021.1.MP3 | ||
| Siemens | N/A | T2Go et Teamcenter Visualization versions antérieures à V13.1.0.3 | ||
| Siemens | N/A | SIMATIC RF360R, RF615R, RF680R et RF685R | ||
| Siemens | N/A | Solid Edge SE2020 versions antérieures à 2020MP14 | ||
| Siemens | N/A | Simcenter Femap 2020.2 versions antérieures à V2020.2.MP3 | ||
| Siemens | N/A | SIMATIC RF166C, RF185C, RF186C, RF186CI, RF188C et RF188CI versions antérieures à V1.3.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC NET CP 443-1 OPC UA toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2021 versions ant\u00e9rieures \u00e0 SE2021MP5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML Module versions ant\u00e9rieures \u00e0 V2.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC (incl. SIPLUS NET variants) versions ant\u00e9rieures \u00e0 V2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Simcenter Femap 2021.1 versions ant\u00e9rieures \u00e0 V2021.1.MP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "T2Go et Teamcenter Visualization versions ant\u00e9rieures \u00e0 V13.1.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF360R, RF615R, RF680R et RF685R",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2020 versions ant\u00e9rieures \u00e0 2020MP14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Simcenter Femap 2020.2 versions ant\u00e9rieures \u00e0 V2020.2.MP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF166C, RF185C, RF186C, RF186CI, RF188C et RF188CI versions ant\u00e9rieures \u00e0 V1.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1547"
},
{
"name": "CVE-2016-4956",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4956"
},
{
"name": "CVE-2021-33712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33712"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2016-4953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4953"
},
{
"name": "CVE-2021-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27399"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2016-1550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1550"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2021-31343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31343"
},
{
"name": "CVE-2016-7433",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7433"
},
{
"name": "CVE-2016-4955",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4955"
},
{
"name": "CVE-2015-7853",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7853"
},
{
"name": "CVE-2015-8138",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8138"
},
{
"name": "CVE-2016-4954",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4954"
},
{
"name": "CVE-2021-27387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27387"
},
{
"name": "CVE-2021-31342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31342"
},
{
"name": "CVE-2016-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2518"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2016-7431",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7431"
},
{
"name": "CVE-2021-31340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31340"
},
{
"name": "CVE-2021-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27390"
},
{
"name": "CVE-2017-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6458"
},
{
"name": "CVE-2016-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1548"
},
{
"name": "CVE-2016-9042",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9042"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-442",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-208356 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-208356.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-645530 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-645530.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-200951 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419820 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-133038 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-133038.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-787292 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-787292.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-522654 du 08 juin 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-522654.pdf"
}
]
}
CERTFR-2020-AVI-198
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS Evolved | Junos OS Evolved 19.1R1-EVO, 19.2R1-EVO et 19.3R1-EVO | ||
| Owncloud | Core | JATP-OS All-In-One et JATP-OS Core versions antérieures à 5.0.6.0 | ||
| N/A | N/A | Série NFX250 versions antérieures à 19.2R1 | ||
| N/A | N/A | JSA versions antérieures à 7.3.2 Patch 5 et 7.3.3 Patch 1 FixPack 1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D86, 12.3R12-S14, 12.3X48-D80, 12.3X48-D86, 12.3X48-D90, 12.3X48-D95, 14.1X53-D51, 14.1X53-D53, 15.1F6-S13, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X49-D210, 15.1X53-D238, 15.1X53-D497, 15.1X53-D592, 15.1X53-D593, 16.1R4-S13, 16.1R7-S4, 16.1R7-S6, 16.1R7-S7, 16.2R2-S10, 16.2R2-S11, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.1R3-S2, 17.2R1-S9, 17.2R2-S7, 17.2R2-S8, 17.2R3, 17.2R3-S3, 17.2X75-D102, 17.2X75-D105, 17.2X75-D110, 17.2X75-D44, 17.3R2-S5, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R1-S8, 17.4R2, 17.4R2-S5, 17.4R2-S6, 17.4R2-S7, 17.4R2-S8, 17.4R2-S9, 17.4R3, 18.1R2-S4, 18.1R3, 18.1R3-S4, 18.1R3-S7, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S5, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S1, 18.2R3-S2, 18.2R3-S3, 18.2X75-D12, 18.2X75-D20, 18.2X75-D30, 18.2X75-D33, 18.2X75-D410, 18.2X75-D411, 18.2X75-D420, 18.2X75-D50, 18.2X75-D51, 18.2X75-D60, 18.3R1-S5, 18.3R1-S6, 18.3R1-S7, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.3R3-S1, 18.4R1, 18.4R1-S4, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S1, 18.4R2-S2, 18.4R2-S3, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.1R3, 19.2R1, 19.2R1-S1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R2, 19.3R1, 19.3R1-S1, 19.3R2, 19.3R3 et 19.4R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS Evolved 19.1R1-EVO, 19.2R1-EVO et 19.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "JATP-OS All-In-One et JATP-OS Core versions ant\u00e9rieures \u00e0 5.0.6.0",
"product": {
"name": "Core",
"vendor": {
"name": "Owncloud",
"scada": false
}
}
},
{
"description": "S\u00e9rie NFX250 versions ant\u00e9rieures \u00e0 19.2R1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "JSA versions ant\u00e9rieures \u00e0 7.3.2 Patch 5 et 7.3.3 Patch 1 FixPack 1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D86, 12.3R12-S14, 12.3X48-D80, 12.3X48-D86, 12.3X48-D90, 12.3X48-D95, 14.1X53-D51, 14.1X53-D53, 15.1F6-S13, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X49-D210, 15.1X53-D238, 15.1X53-D497, 15.1X53-D592, 15.1X53-D593, 16.1R4-S13, 16.1R7-S4, 16.1R7-S6, 16.1R7-S7, 16.2R2-S10, 16.2R2-S11, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.1R3-S2, 17.2R1-S9, 17.2R2-S7, 17.2R2-S8, 17.2R3, 17.2R3-S3, 17.2X75-D102, 17.2X75-D105, 17.2X75-D110, 17.2X75-D44, 17.3R2-S5, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R1-S8, 17.4R2, 17.4R2-S5, 17.4R2-S6, 17.4R2-S7, 17.4R2-S8, 17.4R2-S9, 17.4R3, 18.1R2-S4, 18.1R3, 18.1R3-S4, 18.1R3-S7, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S5, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S1, 18.2R3-S2, 18.2R3-S3, 18.2X75-D12, 18.2X75-D20, 18.2X75-D30, 18.2X75-D33, 18.2X75-D410, 18.2X75-D411, 18.2X75-D420, 18.2X75-D50, 18.2X75-D51, 18.2X75-D60, 18.3R1-S5, 18.3R1-S6, 18.3R1-S7, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.3R3-S1, 18.4R1, 18.4R1-S4, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S1, 18.4R2-S2, 18.4R2-S3, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.1R3, 19.2R1, 19.2R1-S1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R2, 19.3R1, 19.3R1-S1, 19.3R2, 19.3R3 et 19.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-4556",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4556"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2020-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1621"
},
{
"name": "CVE-2019-4509",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4509"
},
{
"name": "CVE-2019-4454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4454"
},
{
"name": "CVE-2019-10173",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10173"
},
{
"name": "CVE-2020-1626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1626"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2020-1627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1627"
},
{
"name": "CVE-2020-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1620"
},
{
"name": "CVE-2019-4581",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4581"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2018-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6918"
},
{
"name": "CVE-2018-1139",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1139"
},
{
"name": "CVE-2020-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1615"
},
{
"name": "CVE-2018-11784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11784"
},
{
"name": "CVE-2016-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1285"
},
{
"name": "CVE-2020-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1616"
},
{
"name": "CVE-2020-1618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1618"
},
{
"name": "CVE-2018-10858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10858"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4470"
},
{
"name": "CVE-2013-7285",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7285"
},
{
"name": "CVE-2020-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1632"
},
{
"name": "CVE-2020-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1622"
},
{
"name": "CVE-2020-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1634"
},
{
"name": "CVE-2018-6916",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6916"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2020-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1623"
},
{
"name": "CVE-2018-11237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11237"
},
{
"name": "CVE-2020-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1619"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-0071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0071"
},
{
"name": "CVE-2020-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1629"
},
{
"name": "CVE-2020-1624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1624"
},
{
"name": "CVE-2020-1625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1625"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2020-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1630"
},
{
"name": "CVE-2016-1286",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1286"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4559"
},
{
"name": "CVE-2020-1613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1613"
},
{
"name": "CVE-2020-1617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1617"
},
{
"name": "CVE-2020-1614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1614"
},
{
"name": "CVE-2020-1628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1628"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-198",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-04-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11004 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11004\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10997 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10997\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11002 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11002\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10994 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10994\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11003 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11003\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10998 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10998\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11010 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11010\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11013 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11013\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11009 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11009\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11016 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11016\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10999 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10999\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11014 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11014\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11006 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11006\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11008 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11008\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11005 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11005\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11001 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11001\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10996 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10996\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11007 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11007\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11000 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11000\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-607
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus version 7.1.3 et ant\u00e9rieures",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Nessus versions 8.1.0 et ant\u00e9rieures",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-607",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-12-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2018-17 du 20 d\u00e9cembre 2018",
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2018-16 du 20 d\u00e9cembre 2018",
"url": "https://www.tenable.com/security/tns-2018-16"
}
]
}
CERTFR-2018-AVI-589
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.1.x antérieures à 6.1.1.6 iFix2 | ||
| IBM | N/A | IBM Security SiteProtector System versions 3.0.0.x antérieures à 3.0.0.20 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 7.x antérieures à 7.0.4.0 iFix1 | ||
| IBM | N/A | VRA - Vyatta 5600 | ||
| IBM | WebSphere | IBM Java SDK dans IBM WebSphere Application Server versions 1.0.0.0 à 1.0.0.7 et 2.2.0.0 à 2.2.6.0 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.2.x antérieures à 6.2.0.6 iFix2 | ||
| IBM | QRadar | IBM QRadar Network Security versions 5.5.x antérieures à 5.5.0.1 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.6.x antérieures à 7.6.0.3 | ||
| IBM | N/A | IBM Social Program Management Design System versions antérieures à 1.4.0 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.0.5.x antérieures à 6.0.5.10 iFix4 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.1.x antérieures à 7.1.0.20 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.2.x antérieures à 7.2.10 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 7.0.x antérieures à 7.0.1.3 | ||
| IBM | N/A | IBM Lotus Protector for Mail Security version 2.8.1.0 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.2.x antérieures à 7.2.0.17 | ||
| IBM | QRadar | IBM QRadar Network Security versions 5.4.x antérieures à 5.4.0.6 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.1.x antérieures à 7.1.10 | ||
| IBM | N/A | IBM Security SiteProtector System versions 3.1.1.x antérieures à 3.1.1.17 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.0.x antérieures à 7.5.0.11 | ||
| IBM | WebSphere | WebSphere Application Server versions antérieures à 9.0.0.10 | ||
| IBM | N/A | IBM Voice Gateway versions antérieures à 1.0.0.7a | ||
| IBM | N/A | IBM Lotus Protector for Mail Security version 2.8.3.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.1.x ant\u00e9rieures \u00e0 6.1.1.6 iFix2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security SiteProtector System versions 3.0.0.x ant\u00e9rieures \u00e0 3.0.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 7.x ant\u00e9rieures \u00e0 7.0.4.0 iFix1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VRA - Vyatta 5600",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Java SDK dans IBM WebSphere Application Server versions 1.0.0.0 \u00e0 1.0.0.7 et 2.2.0.0 \u00e0 2.2.6.0",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.6 iFix2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Security versions 5.5.x ant\u00e9rieures \u00e0 5.5.0.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.6.x ant\u00e9rieures \u00e0 7.6.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Social Program Management Design System versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.0.5.x ant\u00e9rieures \u00e0 6.0.5.10 iFix4",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.1.x ant\u00e9rieures \u00e0 7.1.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.2.x ant\u00e9rieures \u00e0 7.2.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 7.0.x ant\u00e9rieures \u00e0 7.0.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Lotus Protector for Mail Security version 2.8.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.2.x ant\u00e9rieures \u00e0 7.2.0.17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Security versions 5.4.x ant\u00e9rieures \u00e0 5.4.0.6",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.1.x ant\u00e9rieures \u00e0 7.1.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security SiteProtector System versions 3.1.1.x ant\u00e9rieures \u00e0 3.1.1.17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.0.x ant\u00e9rieures \u00e0 7.5.0.11",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions ant\u00e9rieures \u00e0 9.0.0.10",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Voice Gateway versions ant\u00e9rieures \u00e0 1.0.0.7a",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Lotus Protector for Mail Security version 2.8.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-16058",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16058"
},
{
"name": "CVE-2018-10873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10873"
},
{
"name": "CVE-2018-3721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3721"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-10933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10933"
},
{
"name": "CVE-2018-16658",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16658"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-10902",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10902"
},
{
"name": "CVE-2018-15594",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15594"
},
{
"name": "CVE-2018-16151",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16151"
},
{
"name": "CVE-2018-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8039"
},
{
"name": "CVE-2018-1656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1656"
},
{
"name": "CVE-2018-1671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1671"
},
{
"name": "CVE-2018-2973",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2973"
},
{
"name": "CVE-2018-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6554"
},
{
"name": "CVE-2018-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1652"
},
{
"name": "CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"name": "CVE-2018-17182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17182"
},
{
"name": "CVE-2018-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2964"
},
{
"name": "CVE-2018-3139",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3139"
},
{
"name": "CVE-2018-15572",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15572"
},
{
"name": "CVE-2018-14609",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14609"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-14618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14618"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2017-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3732"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2018-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16056"
},
{
"name": "CVE-2018-3180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3180"
},
{
"name": "CVE-2018-1900",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1900"
},
{
"name": "CVE-2018-14617",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14617"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2018-16839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16839"
},
{
"name": "CVE-2018-14633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14633"
},
{
"name": "CVE-2018-14678",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14678"
},
{
"name": "CVE-2018-13099",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13099"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-9516",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9516"
},
{
"name": "CVE-2018-9363",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9363"
},
{
"name": "CVE-2018-16152",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16152"
},
{
"name": "CVE-2018-10938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10938"
},
{
"name": "CVE-2018-14734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14734"
},
{
"name": "CVE-2016-0705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0705"
},
{
"name": "CVE-2018-1957",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1957"
},
{
"name": "CVE-2018-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1654"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2018-8013",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8013"
},
{
"name": "CVE-2018-12539",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12539"
},
{
"name": "CVE-2018-16276",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16276"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-589",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-12-10T00:00:00.000000"
},
{
"description": "Ajout de deux bulletins de s\u00e9curit\u00e9 IBM Lotus Protector",
"revision_date": "2018-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10732880 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10732880"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739019 du 05 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739019"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744291 du 05 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744291"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744157 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744157"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739035 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739035"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744557 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744557"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739985 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739985"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10740799 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10740799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10743847 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10743847"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10736137 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10736137"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10742369 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10742369"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739027 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739027"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744247 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744247"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744553 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744553"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10740789 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10740789"
}
]
}
CERTFR-2020-AVI-691
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper JIMS versions ant\u00e9rieures \u00e0 1.2.1 et 1.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper SBR Carrier tout versions ant\u00e9rieures \u00e0 8.5.0-R17",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Contrail Networking versions ant\u00e9rieures \u00e0 R2008",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper SBR Carrier 8.6 versions ant\u00e9rieures \u00e0 8.6.0-R12",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2019-1549",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1549"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2019-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14846"
},
{
"name": "CVE-2019-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1552"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2016-9841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9841"
},
{
"name": "CVE-2018-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20217"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2020-5260",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5260"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-691",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11087 du 28 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11087\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11074 du 28 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11074\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11073 du 28 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11073\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-025
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Connectors versions 2.1.8 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 8.0.13 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 5.7.24 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 4.0.7 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 8.0.13 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 8.0.13 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.13 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 5.6.42 et antérieures |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Connectors versions 2.1.8 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.0.13 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 5.7.24 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 4.0.7 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.13 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 8.0.13 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.13 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 5.6.42 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-2529",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2529"
},
{
"name": "CVE-2019-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2510"
},
{
"name": "CVE-2018-10933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10933"
},
{
"name": "CVE-2019-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2420"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2486"
},
{
"name": "CVE-2019-2434",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2434"
},
{
"name": "CVE-2019-2528",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2528"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2532"
},
{
"name": "CVE-2019-2537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2537"
},
{
"name": "CVE-2019-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2481"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2531"
},
{
"name": "CVE-2019-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2503"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2534"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2482"
},
{
"name": "CVE-2019-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2455"
},
{
"name": "CVE-2019-2507",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2507"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-025",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2019-5072801 du 15 janvier 2019",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixMSQL"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2019verbose-5072807 du 15 janvier 2019",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019verbose-5072807.html#MSQL"
}
]
}
CERTFR-2018-AVI-589
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.1.x antérieures à 6.1.1.6 iFix2 | ||
| IBM | N/A | IBM Security SiteProtector System versions 3.0.0.x antérieures à 3.0.0.20 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 7.x antérieures à 7.0.4.0 iFix1 | ||
| IBM | N/A | VRA - Vyatta 5600 | ||
| IBM | WebSphere | IBM Java SDK dans IBM WebSphere Application Server versions 1.0.0.0 à 1.0.0.7 et 2.2.0.0 à 2.2.6.0 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.2.x antérieures à 6.2.0.6 iFix2 | ||
| IBM | QRadar | IBM QRadar Network Security versions 5.5.x antérieures à 5.5.0.1 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.6.x antérieures à 7.6.0.3 | ||
| IBM | N/A | IBM Social Program Management Design System versions antérieures à 1.4.0 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 6.0.5.x antérieures à 6.0.5.10 iFix4 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.1.x antérieures à 7.1.0.20 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.2.x antérieures à 7.2.10 | ||
| IBM | N/A | IBM Cúram Social Program Management (SPM) versions 7.0.x antérieures à 7.0.1.3 | ||
| IBM | N/A | IBM Lotus Protector for Mail Security version 2.8.1.0 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.2.x antérieures à 7.2.0.17 | ||
| IBM | QRadar | IBM QRadar Network Security versions 5.4.x antérieures à 5.4.0.6 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.1.x antérieures à 7.1.10 | ||
| IBM | N/A | IBM Security SiteProtector System versions 3.1.1.x antérieures à 3.1.1.17 | ||
| IBM | N/A | IBM DataPower Gateway versions 7.5.0.x antérieures à 7.5.0.11 | ||
| IBM | WebSphere | WebSphere Application Server versions antérieures à 9.0.0.10 | ||
| IBM | N/A | IBM Voice Gateway versions antérieures à 1.0.0.7a | ||
| IBM | N/A | IBM Lotus Protector for Mail Security version 2.8.3.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.1.x ant\u00e9rieures \u00e0 6.1.1.6 iFix2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security SiteProtector System versions 3.0.0.x ant\u00e9rieures \u00e0 3.0.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 7.x ant\u00e9rieures \u00e0 7.0.4.0 iFix1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VRA - Vyatta 5600",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Java SDK dans IBM WebSphere Application Server versions 1.0.0.0 \u00e0 1.0.0.7 et 2.2.0.0 \u00e0 2.2.6.0",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.6 iFix2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Security versions 5.5.x ant\u00e9rieures \u00e0 5.5.0.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.6.x ant\u00e9rieures \u00e0 7.6.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Social Program Management Design System versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 6.0.5.x ant\u00e9rieures \u00e0 6.0.5.10 iFix4",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.1.x ant\u00e9rieures \u00e0 7.1.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.2.x ant\u00e9rieures \u00e0 7.2.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM C\u00faram Social Program Management (SPM) versions 7.0.x ant\u00e9rieures \u00e0 7.0.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Lotus Protector for Mail Security version 2.8.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.2.x ant\u00e9rieures \u00e0 7.2.0.17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Security versions 5.4.x ant\u00e9rieures \u00e0 5.4.0.6",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.1.x ant\u00e9rieures \u00e0 7.1.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security SiteProtector System versions 3.1.1.x ant\u00e9rieures \u00e0 3.1.1.17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM DataPower Gateway versions 7.5.0.x ant\u00e9rieures \u00e0 7.5.0.11",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions ant\u00e9rieures \u00e0 9.0.0.10",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Voice Gateway versions ant\u00e9rieures \u00e0 1.0.0.7a",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Lotus Protector for Mail Security version 2.8.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-16058",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16058"
},
{
"name": "CVE-2018-10873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10873"
},
{
"name": "CVE-2018-3721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3721"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-10933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10933"
},
{
"name": "CVE-2018-16658",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16658"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-10902",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10902"
},
{
"name": "CVE-2018-15594",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15594"
},
{
"name": "CVE-2018-16151",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16151"
},
{
"name": "CVE-2018-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8039"
},
{
"name": "CVE-2018-1656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1656"
},
{
"name": "CVE-2018-1671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1671"
},
{
"name": "CVE-2018-2973",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2973"
},
{
"name": "CVE-2018-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6554"
},
{
"name": "CVE-2018-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1652"
},
{
"name": "CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"name": "CVE-2018-17182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17182"
},
{
"name": "CVE-2018-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2964"
},
{
"name": "CVE-2018-3139",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3139"
},
{
"name": "CVE-2018-15572",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15572"
},
{
"name": "CVE-2018-14609",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14609"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-14618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14618"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2017-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3732"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2018-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16056"
},
{
"name": "CVE-2018-3180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3180"
},
{
"name": "CVE-2018-1900",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1900"
},
{
"name": "CVE-2018-14617",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14617"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2018-16839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16839"
},
{
"name": "CVE-2018-14633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14633"
},
{
"name": "CVE-2018-14678",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14678"
},
{
"name": "CVE-2018-13099",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13099"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-9516",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9516"
},
{
"name": "CVE-2018-9363",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9363"
},
{
"name": "CVE-2018-16152",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16152"
},
{
"name": "CVE-2018-10938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10938"
},
{
"name": "CVE-2018-14734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14734"
},
{
"name": "CVE-2016-0705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0705"
},
{
"name": "CVE-2018-1957",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1957"
},
{
"name": "CVE-2018-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1654"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2018-8013",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8013"
},
{
"name": "CVE-2018-12539",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12539"
},
{
"name": "CVE-2018-16276",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16276"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-589",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-12-10T00:00:00.000000"
},
{
"description": "Ajout de deux bulletins de s\u00e9curit\u00e9 IBM Lotus Protector",
"revision_date": "2018-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10732880 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10732880"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739019 du 05 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739019"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744291 du 05 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744291"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744157 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744157"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739035 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739035"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744557 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744557"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739985 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739985"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10740799 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10740799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10743847 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10743847"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10736137 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10736137"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10742369 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10742369"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10739027 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10739027"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744247 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744247"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10744553 du 06 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10744553"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM ibm10740789 du 07 d\u00e9cembre 2018",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10740789"
}
]
}
CERTFR-2018-AVI-511
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits Tenable. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "LCE versions ant\u00e9rieures \u00e0 5.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Nessus versions ant\u00e9rieures \u00e0 8.0.0",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-511",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Tenable. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Tenable",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2018-13 du 23 octobre 2018",
"url": "https://www.tenable.com/security/tns-2018-13"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2018-14 du 23 octobre 2018",
"url": "https://www.tenable.com/security/tns-2018-14"
}
]
}
CERTFR-2020-AVI-198
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS Evolved | Junos OS Evolved 19.1R1-EVO, 19.2R1-EVO et 19.3R1-EVO | ||
| Owncloud | Core | JATP-OS All-In-One et JATP-OS Core versions antérieures à 5.0.6.0 | ||
| N/A | N/A | Série NFX250 versions antérieures à 19.2R1 | ||
| N/A | N/A | JSA versions antérieures à 7.3.2 Patch 5 et 7.3.3 Patch 1 FixPack 1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D86, 12.3R12-S14, 12.3X48-D80, 12.3X48-D86, 12.3X48-D90, 12.3X48-D95, 14.1X53-D51, 14.1X53-D53, 15.1F6-S13, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X49-D210, 15.1X53-D238, 15.1X53-D497, 15.1X53-D592, 15.1X53-D593, 16.1R4-S13, 16.1R7-S4, 16.1R7-S6, 16.1R7-S7, 16.2R2-S10, 16.2R2-S11, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.1R3-S2, 17.2R1-S9, 17.2R2-S7, 17.2R2-S8, 17.2R3, 17.2R3-S3, 17.2X75-D102, 17.2X75-D105, 17.2X75-D110, 17.2X75-D44, 17.3R2-S5, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R1-S8, 17.4R2, 17.4R2-S5, 17.4R2-S6, 17.4R2-S7, 17.4R2-S8, 17.4R2-S9, 17.4R3, 18.1R2-S4, 18.1R3, 18.1R3-S4, 18.1R3-S7, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S5, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S1, 18.2R3-S2, 18.2R3-S3, 18.2X75-D12, 18.2X75-D20, 18.2X75-D30, 18.2X75-D33, 18.2X75-D410, 18.2X75-D411, 18.2X75-D420, 18.2X75-D50, 18.2X75-D51, 18.2X75-D60, 18.3R1-S5, 18.3R1-S6, 18.3R1-S7, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.3R3-S1, 18.4R1, 18.4R1-S4, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S1, 18.4R2-S2, 18.4R2-S3, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.1R3, 19.2R1, 19.2R1-S1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R2, 19.3R1, 19.3R1-S1, 19.3R2, 19.3R3 et 19.4R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS Evolved 19.1R1-EVO, 19.2R1-EVO et 19.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "JATP-OS All-In-One et JATP-OS Core versions ant\u00e9rieures \u00e0 5.0.6.0",
"product": {
"name": "Core",
"vendor": {
"name": "Owncloud",
"scada": false
}
}
},
{
"description": "S\u00e9rie NFX250 versions ant\u00e9rieures \u00e0 19.2R1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "JSA versions ant\u00e9rieures \u00e0 7.3.2 Patch 5 et 7.3.3 Patch 1 FixPack 1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D86, 12.3R12-S14, 12.3X48-D80, 12.3X48-D86, 12.3X48-D90, 12.3X48-D95, 14.1X53-D51, 14.1X53-D53, 15.1F6-S13, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X49-D210, 15.1X53-D238, 15.1X53-D497, 15.1X53-D592, 15.1X53-D593, 16.1R4-S13, 16.1R7-S4, 16.1R7-S6, 16.1R7-S7, 16.2R2-S10, 16.2R2-S11, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.1R3-S2, 17.2R1-S9, 17.2R2-S7, 17.2R2-S8, 17.2R3, 17.2R3-S3, 17.2X75-D102, 17.2X75-D105, 17.2X75-D110, 17.2X75-D44, 17.3R2-S5, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R1-S8, 17.4R2, 17.4R2-S5, 17.4R2-S6, 17.4R2-S7, 17.4R2-S8, 17.4R2-S9, 17.4R3, 18.1R2-S4, 18.1R3, 18.1R3-S4, 18.1R3-S7, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S5, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S1, 18.2R3-S2, 18.2R3-S3, 18.2X75-D12, 18.2X75-D20, 18.2X75-D30, 18.2X75-D33, 18.2X75-D410, 18.2X75-D411, 18.2X75-D420, 18.2X75-D50, 18.2X75-D51, 18.2X75-D60, 18.3R1-S5, 18.3R1-S6, 18.3R1-S7, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.3R3-S1, 18.4R1, 18.4R1-S4, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S1, 18.4R2-S2, 18.4R2-S3, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.1R3, 19.2R1, 19.2R1-S1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R2, 19.3R1, 19.3R1-S1, 19.3R2, 19.3R3 et 19.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-4556",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4556"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2020-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1621"
},
{
"name": "CVE-2019-4509",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4509"
},
{
"name": "CVE-2019-4454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4454"
},
{
"name": "CVE-2019-10173",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10173"
},
{
"name": "CVE-2020-1626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1626"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2020-1627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1627"
},
{
"name": "CVE-2020-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1620"
},
{
"name": "CVE-2019-4581",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4581"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2018-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6918"
},
{
"name": "CVE-2018-1139",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1139"
},
{
"name": "CVE-2020-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1615"
},
{
"name": "CVE-2018-11784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11784"
},
{
"name": "CVE-2016-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1285"
},
{
"name": "CVE-2020-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1616"
},
{
"name": "CVE-2020-1618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1618"
},
{
"name": "CVE-2018-10858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10858"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4470"
},
{
"name": "CVE-2013-7285",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7285"
},
{
"name": "CVE-2020-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1632"
},
{
"name": "CVE-2020-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1622"
},
{
"name": "CVE-2020-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1634"
},
{
"name": "CVE-2018-6916",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6916"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2020-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1623"
},
{
"name": "CVE-2018-11237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11237"
},
{
"name": "CVE-2020-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1619"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-0071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0071"
},
{
"name": "CVE-2020-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1629"
},
{
"name": "CVE-2020-1624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1624"
},
{
"name": "CVE-2020-1625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1625"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2020-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1630"
},
{
"name": "CVE-2016-1286",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1286"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4559"
},
{
"name": "CVE-2020-1613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1613"
},
{
"name": "CVE-2020-1617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1617"
},
{
"name": "CVE-2020-1614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1614"
},
{
"name": "CVE-2020-1628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1628"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-198",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-04-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11004 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11004\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10997 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10997\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11002 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11002\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10994 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10994\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11003 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11003\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10998 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10998\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11010 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11010\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11013 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11013\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11009 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11009\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11016 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11016\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10999 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10999\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11014 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11014\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11006 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11006\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11008 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11008\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11005 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11005\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11001 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11001\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10996 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10996\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11007 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11007\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11000 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11000\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-325
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Junos Space versions antérieures à 19.2R1 | ||
| Juniper Networks | Secure Analytics | Juniper Secure Analytics (JSA) versions antérieures à 7.3.2 Patch 1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S13, 12.3X48-D80, 12.3X48-D85, 12.3X48-D90, 14.1X53-D130, 14.1X53-D49, 14.1X53-D51, 15.1F6-S12, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X49-D171, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X53-D237, 15.1X53-D238, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69, 16.1R3-S11, 16.1R7-S3, 16.1R7-S4, 16.1R7-S5, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3, 17.2R3-S1, 17.2X75-D105, 17.3R3-S2, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R1-S8, 17.4R2-S2, 17.4R2-S3, 17.4R2-S4, 17.4R2-S5, 17.4R3, 18.1R2-S4, 18.1R3-S2, 18.1R3-S3, 18.1R3-S5, 18.1R3-S6, 18.2R1-S5, 18.2R2, 18.2R2-S1, 18.2R2-S2, 18.2R2-S3, 18.2R3, 18.2X75-D12, 18.2X75-D30, 18.2X75-D40, 18.2X75-D50, 18.3R1-S2, 18.3R1-S3, 18.3R1-S4, 18.3R2, 18.4R1, 18.4R1-S1, 18.4R1-S2, 18.4R2, 19.1R1, 19.1R1-S1, 19.1R2 et 19.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D115, 14.1X53-D51, 16.1R7-S5, 17.1R3, 17.2R3, 17.2R3-S2, 17.3R3-S2, 17.3R3-S3, 17.4R2, 17.4R2-S5, 17.4R3, 18.1R3, 18.1R3-S1, 18.2R2, 18.3R1, 18.3R2 et 18.4R1 sur séries EX4300 | ||
| Juniper Networks | N/A | Junos OS avec J-Web activé versions antérieures à 12.3R12-S14, 12.3X48-D80, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X53-D497, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3, 17.2R2-S7, 17.2R3-S1, 17.3R3-S5, 17.4R1-S7, 17.4R2-S4, 17.4R3, 18.1R3-S5 et 18.2R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 19.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Secure Analytics (JSA) versions ant\u00e9rieures \u00e0 7.3.2 Patch 1",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S13, 12.3X48-D80, 12.3X48-D85, 12.3X48-D90, 14.1X53-D130, 14.1X53-D49, 14.1X53-D51, 15.1F6-S12, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X49-D171, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X53-D237, 15.1X53-D238, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69, 16.1R3-S11, 16.1R7-S3, 16.1R7-S4, 16.1R7-S5, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3, 17.2R3-S1, 17.2X75-D105, 17.3R3-S2, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R1-S8, 17.4R2-S2, 17.4R2-S3, 17.4R2-S4, 17.4R2-S5, 17.4R3, 18.1R2-S4, 18.1R3-S2, 18.1R3-S3, 18.1R3-S5, 18.1R3-S6, 18.2R1-S5, 18.2R2, 18.2R2-S1, 18.2R2-S2, 18.2R2-S3, 18.2R3, 18.2X75-D12, 18.2X75-D30, 18.2X75-D40, 18.2X75-D50, 18.3R1-S2, 18.3R1-S3, 18.3R1-S4, 18.3R2, 18.4R1, 18.4R1-S1, 18.4R1-S2, 18.4R2, 19.1R1, 19.1R1-S1, 19.1R2 et 19.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D115, 14.1X53-D51, 16.1R7-S5, 17.1R3, 17.2R3, 17.2R3-S2, 17.3R3-S2, 17.3R3-S3, 17.4R2, 17.4R2-S5, 17.4R3, 18.1R3, 18.1R3-S1, 18.2R2, 18.3R1, 18.3R2 et 18.4R1 sur s\u00e9ries EX4300",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS avec J-Web activ\u00e9 versions ant\u00e9rieures \u00e0 12.3R12-S14, 12.3X48-D80, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X53-D497, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3, 17.2R2-S7, 17.2R3-S1, 17.3R3-S5, 17.4R1-S7, 17.4R2-S4, 17.4R3, 18.1R3-S5 et 18.2R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-8615",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8615"
},
{
"name": "CVE-2019-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0049"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2016-8619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
},
{
"name": "CVE-2018-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15505"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-10902",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10902"
},
{
"name": "CVE-2019-0048",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0048"
},
{
"name": "CVE-2016-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8624"
},
{
"name": "CVE-2016-8616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8616"
},
{
"name": "CVE-2016-8620",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8620"
},
{
"name": "CVE-2016-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8617"
},
{
"name": "CVE-2019-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0053"
},
{
"name": "CVE-2016-8618",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
},
{
"name": "CVE-2019-5739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5739"
},
{
"name": "CVE-2019-0052",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0052"
},
{
"name": "CVE-2016-8623",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8623"
},
{
"name": "CVE-2019-0046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0046"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-11237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11237"
},
{
"name": "CVE-2016-8621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8621"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2018-15504",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15504"
},
{
"name": "CVE-2016-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2018-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1729"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-325",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10938 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10938\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10946 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10946\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10942 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10942\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10949 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10949\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10943 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10943\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10951 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10951\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10950 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10950\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10948 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10948\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10947 du 10 juillet 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10947\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2020-AVI-691
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper JIMS versions ant\u00e9rieures \u00e0 1.2.1 et 1.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper SBR Carrier tout versions ant\u00e9rieures \u00e0 8.5.0-R17",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Contrail Networking versions ant\u00e9rieures \u00e0 R2008",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper SBR Carrier 8.6 versions ant\u00e9rieures \u00e0 8.6.0-R12",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2019-1549",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1549"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2019-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14846"
},
{
"name": "CVE-2019-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1552"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2016-9841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9841"
},
{
"name": "CVE-2018-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20217"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2020-5260",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5260"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-691",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11087 du 28 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11087\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11074 du 28 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11074\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11073 du 28 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11073\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-497
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Virtualization. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Virtualization | Oracle VM VirtualBox versions antérieures à 5.2.20 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 5.2.20",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3289",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3289"
},
{
"name": "CVE-2018-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3296"
},
{
"name": "CVE-2018-3298",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3298"
},
{
"name": "CVE-2018-2909",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2909"
},
{
"name": "CVE-2018-3287",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3287"
},
{
"name": "CVE-2018-3294",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3294"
},
{
"name": "CVE-2018-3292",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3292"
},
{
"name": "CVE-2018-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3297"
},
{
"name": "CVE-2018-3291",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3291"
},
{
"name": "CVE-2018-3293",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3293"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-3295",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3295"
},
{
"name": "CVE-2018-3290",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3290"
},
{
"name": "CVE-2018-3288",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3288"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-497",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle\nVirtualization. Elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Virtualization",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2018verbose du 16 octobre 2018",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2018verbose-5170927.html#OVIR"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 16 octobre 2018",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}
]
}
CERTFR-2018-AVI-607
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus version 7.1.3 et ant\u00e9rieures",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Nessus versions 8.1.0 et ant\u00e9rieures",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-607",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-12-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2018-17 du 20 d\u00e9cembre 2018",
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2018-16 du 20 d\u00e9cembre 2018",
"url": "https://www.tenable.com/security/tns-2018-16"
}
]
}
SSA-419820
Vulnerability from csaf_siemens - Published: 2021-06-08 00:00 - Updated: 2021-06-08 00:00Notes
{
"document": {
"category": "Siemens Security Advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited.",
"tlp": {
"label": "WHITE"
}
},
"notes": [
{
"category": "summary",
"text": "The latest update for TIM 1531 IRC fixes a vulnerability that could allow a remote attacker to cause a denial-of-service under certain circumstances.\n\nSiemens has released an update for the TIM 1531 IRC and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf"
},
{
"category": "self",
"summary": "SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-419820.txt"
},
{
"category": "self",
"summary": "SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-419820.json"
}
],
"title": "SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC",
"tracking": {
"current_release_date": "2021-06-08T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-419820",
"initial_release_date": "2021-06-08T00:00:00Z",
"revision_history": [
{
"date": "2021-06-08T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.2",
"product": {
"name": "TIM 1531 IRC (incl. SIPLUS NET variants)",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "TIM 1531 IRC (incl. SIPLUS NET variants)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2018-0732 - TIM 1531 IRC (incl. SIPLUS NET variants)",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109798331"
},
{
"summary": "CVE-2018-0732 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2018-0732.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109798331"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2018-0732"
}
]
}
RHSA-2018_2552
Vulnerability from csaf_redhat - Published: 2018-08-22 21:13 - Updated: 2024-11-22 12:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat OpenShift Application Runtimes.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Openshift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.\n\nThis release of RHOAR Node.js 8.11.4 serves as a replacement for RHOAR Node.js 8.11.3, and includes bug fixes and enhancements. For further information, refer to the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* nodejs: Out of bounds (OOB) write via UCS-2 encoding (CVE-2018-12115)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2552",
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/index#runtime_components_nodejs_rpm_packages",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/index#runtime_components_nodejs_rpm_packages"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1620219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620219"
},
{
"category": "external",
"summary": "NODE-153",
"url": "https://issues.redhat.com/browse/NODE-153"
},
{
"category": "external",
"summary": "NODE-154",
"url": "https://issues.redhat.com/browse/NODE-154"
},
{
"category": "external",
"summary": "NODE-155",
"url": "https://issues.redhat.com/browse/NODE-155"
},
{
"category": "external",
"summary": "NODE-160",
"url": "https://issues.redhat.com/browse/NODE-160"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2552.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update",
"tracking": {
"current_release_date": "2024-11-22T12:07:24+00:00",
"generator": {
"date": "2024-11-22T12:07:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:2552",
"initial_release_date": "2018-08-22T21:13:07+00:00",
"revision_history": [
{
"date": "2018-08-22T21:13:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-22T21:13:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T12:07:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Application Runtimes Node.js 8",
"product": {
"name": "Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Application Runtimes"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch",
"product": {
"name": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch",
"product_id": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs-docs@8.11.4-2.el7?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"product": {
"name": "rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"product_id": "rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs@8.11.4-2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"product": {
"name": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"product_id": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs-debuginfo@8.11.4-2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"product": {
"name": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"product_id": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@5.6.0-1.8.11.4.2.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-1:8.11.4-2.el7.src",
"product": {
"name": "rhoar-nodejs-1:8.11.4-2.el7.src",
"product_id": "rhoar-nodejs-1:8.11.4-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs@8.11.4-2.el7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64"
},
"product_reference": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-1:8.11.4-2.el7.src as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src"
},
"product_reference": "rhoar-nodejs-1:8.11.4-2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-1:8.11.4-2.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64"
},
"product_reference": "rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64"
},
"product_reference": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
},
"product_reference": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:13:07+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2018-12115",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1620219"
}
],
"notes": [
{
"category": "description",
"text": "In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `\u0027ucs2\u0027`, `\u0027ucs-2\u0027`, `\u0027utf16le\u0027` and `\u0027utf-16le\u0027`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Out of bounds (OOB) write via UCS-2 encoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Openshift Container Platform 3.x versions are potentially vulnerable via the jenkins-slave-nodejs and jenkins-agent-nodejs containers. However a build would have to occur with a malicious jenkins pipeline, or nodejs source code supplied by an attacker, reducing the impact of this flaw to moderate. Both container images used nodejs delivered from Red Hat Software Collections.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12115"
},
{
"category": "external",
"summary": "RHBZ#1620219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12115",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12115"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12115",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12115"
}
],
"release_date": "2018-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:13:07+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
},
{
"category": "workaround",
"details": "On Openshift Container Platform 3.x you can override the container image used on the Jenkins Slave by specifying the JENKINS_SLAVE_IMAGE environment variable in your jenkins deployment configuration. Ref:\n\nhttps://github.com/openshift/jenkins/blob/8e1ab16fb5f44d6570018c5dfa3407692fdba6e5/2/contrib/jenkins/kube-slave-common.sh#L27-L33",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Out of bounds (OOB) write via UCS-2 encoding"
}
]
}
RHSA-2019:1297
Vulnerability from csaf_redhat - Published: 2019-05-30 14:57 - Updated: 2026-02-20 19:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for JBoss Core Services on RHEL 6 and RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 2 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1297",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "JBCS-620",
"url": "https://issues.redhat.com/browse/JBCS-620"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1297.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update",
"tracking": {
"current_release_date": "2026-02-20T19:39:03+00:00",
"generator": {
"date": "2026-02-20T19:39:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2019:1297",
"initial_release_date": "2019-05-30T14:57:48+00:00",
"revision_history": [
{
"date": "2019-05-30T14:57:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-05-30T14:57:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-20T19:39:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:57:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:57:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:57:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
}
]
}
RHSA-2019_1296
Vulnerability from csaf_redhat - Published: 2019-05-30 14:48 - Updated: 2024-11-22 12:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 zip release for RHEL 6 and RHEL 7 is available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering. It serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1296",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "JBCS-620",
"url": "https://issues.redhat.com/browse/JBCS-620"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1296.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update",
"tracking": {
"current_release_date": "2024-11-22T12:07:55+00:00",
"generator": {
"date": "2024-11-22T12:07:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1296",
"initial_release_date": "2019-05-30T14:48:20+00:00",
"revision_history": [
{
"date": "2019-05-30T14:48:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-05-30T14:48:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T12:07:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product": {
"name": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product_id": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:48:20+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:48:20+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:48:20+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
}
]
}
RHSA-2019_1543
Vulnerability from csaf_redhat - Published: 2019-06-18 19:08 - Updated: 2024-11-22 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)\n\n* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)\n\n* curl: HTTP authentication leak in redirects (CVE-2018-1000007)\n\n* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)\n\n* curl: RTSP RTP buffer over-read (CVE-2018-1000122)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1543",
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29"
},
{
"category": "external",
"summary": "1536013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536013"
},
{
"category": "external",
"summary": "1537125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537125"
},
{
"category": "external",
"summary": "1552628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552628"
},
{
"category": "external",
"summary": "1553398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553398"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "1595985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595985"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "JBCS-722",
"url": "https://issues.redhat.com/browse/JBCS-722"
},
{
"category": "external",
"summary": "JBCS-750",
"url": "https://issues.redhat.com/browse/JBCS-750"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1543.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update",
"tracking": {
"current_release_date": "2024-11-22T13:00:03+00:00",
"generator": {
"date": "2024-11-22T13:00:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1543",
"initial_release_date": "2019-06-18T19:08:49+00:00",
"revision_history": [
{
"date": "2019-06-18T19:08:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-18T19:08:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T13:00:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product": {
"name": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product_id": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2018-14404",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595985"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14404"
},
{
"category": "external",
"summary": "RHBZ#1595985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595985"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14404"
}
],
"release_date": "2018-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Harry Sintonen"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16839",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1642201"
}
],
"notes": [
{
"category": "description",
"text": "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16839"
},
{
"category": "external",
"summary": "RHBZ#1642201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16839"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16839",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16839"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16839.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16839.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16840",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1642203"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an \u0027easy\u0027 handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Use-after-free when closing \"easy\" handle in Curl_close()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16840"
},
{
"category": "external",
"summary": "RHBZ#1642203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16840",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16840"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16840",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16840"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16840.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16840.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Use-after-free when closing \"easy\" handle in Curl_close()"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16842",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-10-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1644124"
}
],
"notes": [
{
"category": "description",
"text": "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Heap-based buffer over-read in the curl tool warning formatting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16842"
},
{
"category": "external",
"summary": "RHBZ#1644124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644124"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16842.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16842.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Heap-based buffer over-read in the curl tool warning formatting"
},
{
"acknowledgments": [
{
"names": [
"Daniel Stenberg"
],
"organization": "the Curl project"
},
{
"names": [
"Wenxiang Qian"
],
"organization": "Tencent Blade Team",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16890",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1670252"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: NTLM type-2 heap out-of-bounds buffer read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16890"
},
{
"category": "external",
"summary": "RHBZ#1670252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16890",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16890"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16890.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16890.html"
}
],
"release_date": "2019-02-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "Turn off NTLM authentication.",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: NTLM type-2 heap out-of-bounds buffer read"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Zhouyihai Ding"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000005",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1536013"
}
],
"notes": [
{
"category": "description",
"text": "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn\u0027t updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Out-of-bounds read in code handling HTTP/2 trailers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was introduced in curl-7.49.0. Therefore the versions of curl shipped with Red Hat Enterprise Linux 5, 6 and 7 and Red Hat Ceph Storage 2 are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000005"
},
{
"category": "external",
"summary": "RHBZ#1536013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000005",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-824a.html",
"url": "https://curl.haxx.se/docs/adv_2018-824a.html"
}
],
"release_date": "2018-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Out-of-bounds read in code handling HTTP/2 trailers"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Craig de Stigter"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000007",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1537125"
}
],
"notes": [
{
"category": "description",
"text": "It was found that curl and libcurl might send their Authentication header to a third party HTTP server upon receiving an HTTP REDIRECT reply. This could leak authentication token to external entities.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: HTTP authentication leak in redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of curl as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of httpd24-curl as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000007"
},
{
"category": "external",
"summary": "RHBZ#1537125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-b3bf.html",
"url": "https://curl.haxx.se/docs/adv_2018-b3bf.html"
}
],
"release_date": "2018-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "By default, curl and libcurl will not follow redirect requests.\nThis flaw happens only when curl or libcurl are explicitly requested to follow redirects (option --location in curl, and CURLOPT_FOLLOWLOCATION in libcurl).\nTo mitigate this, it is possible to prevent the automated following of redirects, replacing it by manual redirects (and remove the authentication header), for example.",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: HTTP authentication leak in redirects"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Duy Phan Thanh"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000120",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1552628"
}
],
"notes": [
{
"category": "description",
"text": "It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash or an unspecified behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: FTP path trickery leads to NIL byte out of bounds write",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000120"
},
{
"category": "external",
"summary": "RHBZ#1552628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-9cd6.html",
"url": "https://curl.haxx.se/docs/adv_2018-9cd6.html"
}
],
"release_date": "2018-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: FTP path trickery leads to NIL byte out of bounds write"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Dario Weisser"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000121",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1552631"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: LDAP NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000121"
},
{
"category": "external",
"summary": "RHBZ#1552631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-97a2.html",
"url": "https://curl.haxx.se/docs/adv_2018-97a2.html"
}
],
"release_date": "2018-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: LDAP NULL pointer dereference"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Max Dymond"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000122",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1553398"
}
],
"notes": [
{
"category": "description",
"text": "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: RTSP RTP buffer over-read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000122"
},
{
"category": "external",
"summary": "RHBZ#1553398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-b047.html",
"url": "https://curl.haxx.se/docs/adv_2018-b047.html"
}
],
"release_date": "2018-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: RTSP RTP buffer over-read"
},
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
},
{
"acknowledgments": [
{
"names": [
"Daniel Stenberg"
],
"organization": "the Curl project"
},
{
"names": [
"Wenxiang Qian"
],
"organization": "Tencent Blade Team",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3822",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1670254"
}
],
"notes": [
{
"category": "description",
"text": "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: NTLMv2 type-3 header stack buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3822"
},
{
"category": "external",
"summary": "RHBZ#1670254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670254"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3822"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3822",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3822"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2019-3822.html",
"url": "https://curl.haxx.se/docs/CVE-2019-3822.html"
}
],
"release_date": "2019-02-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "Turn off NTLM authentication.",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: NTLMv2 type-3 header stack buffer overflow"
},
{
"acknowledgments": [
{
"names": [
"Daniel Stenberg"
],
"organization": "the Curl project"
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3823",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1670256"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: SMTP end-of-response out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3823"
},
{
"category": "external",
"summary": "RHBZ#1670256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3823",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3823"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2019-3823.html",
"url": "https://curl.haxx.se/docs/CVE-2019-3823.html"
}
],
"release_date": "2019-02-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "Do not use SMTP authentication with curl",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: SMTP end-of-response out-of-bounds read"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"l00p3r"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-5436",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1710620"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw exists if the user selects to use a \"blksize\" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.\nUsers choosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger. It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5436"
},
{
"category": "external",
"summary": "RHBZ#1710620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5436"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5436",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5436"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2019-5436.html",
"url": "https://curl.haxx.se/docs/CVE-2019-5436.html"
}
],
"release_date": "2019-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function"
}
]
}
RHSA-2018:2552
Vulnerability from csaf_redhat - Published: 2018-08-22 21:13 - Updated: 2026-01-13 22:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat OpenShift Application Runtimes.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Openshift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.\n\nThis release of RHOAR Node.js 8.11.4 serves as a replacement for RHOAR Node.js 8.11.3, and includes bug fixes and enhancements. For further information, refer to the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* nodejs: Out of bounds (OOB) write via UCS-2 encoding (CVE-2018-12115)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2552",
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/index#runtime_components_nodejs_rpm_packages",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/index#runtime_components_nodejs_rpm_packages"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1620219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620219"
},
{
"category": "external",
"summary": "NODE-153",
"url": "https://issues.redhat.com/browse/NODE-153"
},
{
"category": "external",
"summary": "NODE-154",
"url": "https://issues.redhat.com/browse/NODE-154"
},
{
"category": "external",
"summary": "NODE-155",
"url": "https://issues.redhat.com/browse/NODE-155"
},
{
"category": "external",
"summary": "NODE-160",
"url": "https://issues.redhat.com/browse/NODE-160"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2552.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update",
"tracking": {
"current_release_date": "2026-01-13T22:35:13+00:00",
"generator": {
"date": "2026-01-13T22:35:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2018:2552",
"initial_release_date": "2018-08-22T21:13:07+00:00",
"revision_history": [
{
"date": "2018-08-22T21:13:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-22T21:13:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:35:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Application Runtimes Node.js 8",
"product": {
"name": "Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Application Runtimes"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch",
"product": {
"name": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch",
"product_id": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs-docs@8.11.4-2.el7?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"product": {
"name": "rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"product_id": "rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs@8.11.4-2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"product": {
"name": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"product_id": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs-debuginfo@8.11.4-2.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"product": {
"name": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"product_id": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@5.6.0-1.8.11.4.2.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-1:8.11.4-2.el7.src",
"product": {
"name": "rhoar-nodejs-1:8.11.4-2.el7.src",
"product_id": "rhoar-nodejs-1:8.11.4-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs@8.11.4-2.el7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64"
},
"product_reference": "npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-1:8.11.4-2.el7.src as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src"
},
"product_reference": "rhoar-nodejs-1:8.11.4-2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-1:8.11.4-2.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64"
},
"product_reference": "rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64"
},
"product_reference": "rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch as a component of Red Hat OpenShift Application Runtimes Node.js 8",
"product_id": "7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
},
"product_reference": "rhoar-nodejs-docs-1:8.11.4-2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:13:07+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2018-12115",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1620219"
}
],
"notes": [
{
"category": "description",
"text": "In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `\u0027ucs2\u0027`, `\u0027ucs-2\u0027`, `\u0027utf16le\u0027` and `\u0027utf-16le\u0027`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Out of bounds (OOB) write via UCS-2 encoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Openshift Container Platform 3.x versions are potentially vulnerable via the jenkins-slave-nodejs and jenkins-agent-nodejs containers. However a build would have to occur with a malicious jenkins pipeline, or nodejs source code supplied by an attacker, reducing the impact of this flaw to moderate. Both container images used nodejs delivered from Red Hat Software Collections.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12115"
},
{
"category": "external",
"summary": "RHBZ#1620219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12115",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12115"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12115",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12115"
}
],
"release_date": "2018-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:13:07+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
},
{
"category": "workaround",
"details": "On Openshift Container Platform 3.x you can override the container image used on the Jenkins Slave by specifying the JENKINS_SLAVE_IMAGE environment variable in your jenkins deployment configuration. Ref:\n\nhttps://github.com/openshift/jenkins/blob/8e1ab16fb5f44d6570018c5dfa3407692fdba6e5/2/contrib/jenkins/kube-slave-common.sh#L27-L33",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-8:npm-1:5.6.0-1.8.11.4.2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.src",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-debuginfo-1:8.11.4-2.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-8:rhoar-nodejs-docs-1:8.11.4-2.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Out of bounds (OOB) write via UCS-2 encoding"
}
]
}
RHSA-2018_2553
Vulnerability from csaf_redhat - Published: 2018-08-22 21:15 - Updated: 2024-11-22 12:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat OpenShift Application Runtimes.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Openshift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.\n\nThis release of RHOAR Node.js 10.9.0 serves as a replacement for RHOAR Node.js 10.8.0, and includes bug fixes and enhancements. For further information, refer to the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* nodejs: Unintentional exposure of uninitialized memory (CVE-2018-7166)\n\n* nodejs: Out of bounds (OOB) write via UCS-2 encoding (CVE-2018-12115)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2553",
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/index#runtime_components_nodejs_rpm_packages",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/index#runtime_components_nodejs_rpm_packages"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1620215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620215"
},
{
"category": "external",
"summary": "1620219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620219"
},
{
"category": "external",
"summary": "NODE-152",
"url": "https://issues.redhat.com/browse/NODE-152"
},
{
"category": "external",
"summary": "NODE-153",
"url": "https://issues.redhat.com/browse/NODE-153"
},
{
"category": "external",
"summary": "NODE-154",
"url": "https://issues.redhat.com/browse/NODE-154"
},
{
"category": "external",
"summary": "NODE-155",
"url": "https://issues.redhat.com/browse/NODE-155"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2553.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 10.9.0 security update",
"tracking": {
"current_release_date": "2024-11-22T12:07:29+00:00",
"generator": {
"date": "2024-11-22T12:07:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:2553",
"initial_release_date": "2018-08-22T21:15:00+00:00",
"revision_history": [
{
"date": "2018-08-22T21:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-22T21:15:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T12:07:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Application Runtimes Node.js 10",
"product": {
"name": "Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Application Runtimes"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"product": {
"name": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"product_id": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs-debuginfo@10.9.0-1.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"product": {
"name": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"product_id": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.2.0-1.10.9.0.1.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"product": {
"name": "rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"product_id": "rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs@10.9.0-1.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch",
"product": {
"name": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch",
"product_id": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs-docs@10.9.0-1.el7?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-1:10.9.0-1.el7.src",
"product": {
"name": "rhoar-nodejs-1:10.9.0-1.el7.src",
"product_id": "rhoar-nodejs-1:10.9.0-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs@10.9.0-1.el7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64"
},
"product_reference": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-1:10.9.0-1.el7.src as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src"
},
"product_reference": "rhoar-nodejs-1:10.9.0-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-1:10.9.0-1.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64"
},
"product_reference": "rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64"
},
"product_reference": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
},
"product_reference": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:15:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2018-7166",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1620215"
}
],
"notes": [
{
"category": "description",
"text": "In all versions of Node.js 10 prior to 10.9.0, an argument processing flaw can cause `Buffer.alloc()` to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying `encoding` can be passed as a number, this is misinterpreted by `Buffer\u0027s` internal \"fill\" method as the `start` to a fill operation. This flaw may be abused where `Buffer.alloc()` arguments are derived from user input to return uncleared memory blocks that may contain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Unintentional exposure of uninitialized memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7166"
},
{
"category": "external",
"summary": "RHBZ#1620215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7166",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7166"
}
],
"release_date": "2018-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:15:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Unintentional exposure of uninitialized memory"
},
{
"cve": "CVE-2018-12115",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1620219"
}
],
"notes": [
{
"category": "description",
"text": "In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `\u0027ucs2\u0027`, `\u0027ucs-2\u0027`, `\u0027utf16le\u0027` and `\u0027utf-16le\u0027`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Out of bounds (OOB) write via UCS-2 encoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Openshift Container Platform 3.x versions are potentially vulnerable via the jenkins-slave-nodejs and jenkins-agent-nodejs containers. However a build would have to occur with a malicious jenkins pipeline, or nodejs source code supplied by an attacker, reducing the impact of this flaw to moderate. Both container images used nodejs delivered from Red Hat Software Collections.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12115"
},
{
"category": "external",
"summary": "RHBZ#1620219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12115",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12115"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12115",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12115"
}
],
"release_date": "2018-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:15:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
},
{
"category": "workaround",
"details": "On Openshift Container Platform 3.x you can override the container image used on the Jenkins Slave by specifying the JENKINS_SLAVE_IMAGE environment variable in your jenkins deployment configuration. Ref:\n\nhttps://github.com/openshift/jenkins/blob/8e1ab16fb5f44d6570018c5dfa3407692fdba6e5/2/contrib/jenkins/kube-slave-common.sh#L27-L33",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Out of bounds (OOB) write via UCS-2 encoding"
}
]
}
RHSA-2019:1296
Vulnerability from csaf_redhat - Published: 2019-05-30 14:48 - Updated: 2026-02-20 19:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 zip release for RHEL 6 and RHEL 7 is available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering. It serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1296",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "JBCS-620",
"url": "https://issues.redhat.com/browse/JBCS-620"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1296.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update",
"tracking": {
"current_release_date": "2026-02-20T19:39:02+00:00",
"generator": {
"date": "2026-02-20T19:39:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2019:1296",
"initial_release_date": "2019-05-30T14:48:20+00:00",
"revision_history": [
{
"date": "2019-05-30T14:48:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-05-30T14:48:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-20T19:39:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product": {
"name": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product_id": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:48:20+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:48:20+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:48:20+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
}
]
}
RHSA-2018:3221
Vulnerability from csaf_redhat - Published: 2018-10-30 11:11 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739)\n\n* openssl: Malformed X.509 IPAdressFamily could cause OOB read (CVE-2017-3735)\n\n* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3221",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index"
},
{
"category": "external",
"summary": "1486144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486144"
},
{
"category": "external",
"summary": "1548401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548401"
},
{
"category": "external",
"summary": "1561266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561266"
},
{
"category": "external",
"summary": "1568253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253"
},
{
"category": "external",
"summary": "1585004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585004"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "1603597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1603597"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3221.json"
}
],
"title": "Red Hat Security Advisory: openssl security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:06:33+00:00",
"generator": {
"date": "2025-11-21T18:06:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3221",
"initial_release_date": "2018-10-30T11:11:49+00:00",
"revision_history": [
{
"date": "2018-10-30T11:11:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T11:11:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-static-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686",
"product_id": "openssl-libs-1:1.0.2k-16.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686",
"product_id": "openssl-devel-1:1.0.2k-16.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.i686",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.i686",
"product_id": "openssl-static-1:1.0.2k-16.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.src",
"product": {
"name": "openssl-1:1.0.2k-16.el7.src",
"product_id": "openssl-1:1.0.2k-16.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.ppc",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc",
"product_id": "openssl-libs-1:1.0.2k-16.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.ppc",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc",
"product_id": "openssl-devel-1:1.0.2k-16.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.ppc",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc",
"product_id": "openssl-static-1:1.0.2k-16.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-static-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.s390",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390",
"product_id": "openssl-libs-1:1.0.2k-16.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.s390",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390",
"product_id": "openssl-devel-1:1.0.2k-16.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.s390",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.s390",
"product_id": "openssl-static-1:1.0.2k-16.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-libs-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-devel-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-static-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-perl-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-static-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-3735",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1486144"
}
],
"notes": [
{
"category": "description",
"text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malformed X.509 IPAdressFamily could cause OOB read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only exhibits itself when:\n1. OpenSSL is used to display details of a local or a remote certificate.\n2. The certificate contains the uncommon RFC 3779 IPAddressFamily extension.\n\nThe maximum impact of this flaw is garbled information being displayed, there is no impact on the availability of service using such a certificate. Also this flaw can NOT be used to create specially-crafted certificates. Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-3735"
},
{
"category": "external",
"summary": "RHBZ#1486144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3735",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3735"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20170828.txt",
"url": "https://www.openssl.org/news/secadv/20170828.txt"
}
],
"release_date": "2017-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: Malformed X.509 IPAdressFamily could cause OOB read"
},
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2018-0737",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2018-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1568253"
}
],
"notes": [
{
"category": "description",
"text": "OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0737"
},
{
"category": "external",
"summary": "RHBZ#1568253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2018/04/16/3",
"url": "http://www.openwall.com/lists/oss-security/2018/04/16/3"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180416.txt",
"url": "https://www.openssl.org/news/secadv/20180416.txt"
}
],
"release_date": "2018-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys"
},
{
"cve": "CVE-2018-0739",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561266"
}
],
"notes": [
{
"category": "description",
"text": "Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0739"
},
{
"category": "external",
"summary": "RHBZ#1561266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0739"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180327.txt",
"url": "https://www.openssl.org/news/secadv/20180327.txt"
}
],
"release_date": "2018-03-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service"
}
]
}
RHSA-2018:2553
Vulnerability from csaf_redhat - Published: 2018-08-22 21:15 - Updated: 2026-01-13 22:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat OpenShift Application Runtimes.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Openshift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.\n\nThis release of RHOAR Node.js 10.9.0 serves as a replacement for RHOAR Node.js 10.8.0, and includes bug fixes and enhancements. For further information, refer to the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* nodejs: Unintentional exposure of uninitialized memory (CVE-2018-7166)\n\n* nodejs: Out of bounds (OOB) write via UCS-2 encoding (CVE-2018-12115)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2553",
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/index#runtime_components_nodejs_rpm_packages",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/index#runtime_components_nodejs_rpm_packages"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1620215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620215"
},
{
"category": "external",
"summary": "1620219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620219"
},
{
"category": "external",
"summary": "NODE-152",
"url": "https://issues.redhat.com/browse/NODE-152"
},
{
"category": "external",
"summary": "NODE-153",
"url": "https://issues.redhat.com/browse/NODE-153"
},
{
"category": "external",
"summary": "NODE-154",
"url": "https://issues.redhat.com/browse/NODE-154"
},
{
"category": "external",
"summary": "NODE-155",
"url": "https://issues.redhat.com/browse/NODE-155"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2553.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 10.9.0 security update",
"tracking": {
"current_release_date": "2026-01-13T22:16:25+00:00",
"generator": {
"date": "2026-01-13T22:16:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2018:2553",
"initial_release_date": "2018-08-22T21:15:00+00:00",
"revision_history": [
{
"date": "2018-08-22T21:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-22T21:15:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:16:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Application Runtimes Node.js 10",
"product": {
"name": "Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Application Runtimes"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"product": {
"name": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"product_id": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs-debuginfo@10.9.0-1.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"product": {
"name": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"product_id": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.2.0-1.10.9.0.1.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"product": {
"name": "rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"product_id": "rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs@10.9.0-1.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch",
"product": {
"name": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch",
"product_id": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs-docs@10.9.0-1.el7?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rhoar-nodejs-1:10.9.0-1.el7.src",
"product": {
"name": "rhoar-nodejs-1:10.9.0-1.el7.src",
"product_id": "rhoar-nodejs-1:10.9.0-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhoar-nodejs@10.9.0-1.el7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64"
},
"product_reference": "npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-1:10.9.0-1.el7.src as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src"
},
"product_reference": "rhoar-nodejs-1:10.9.0-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-1:10.9.0-1.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64"
},
"product_reference": "rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64 as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64"
},
"product_reference": "rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch as a component of Red Hat OpenShift Application Runtimes Node.js 10",
"product_id": "7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
},
"product_reference": "rhoar-nodejs-docs-1:10.9.0-1.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOAR-NODEJS-10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:15:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2018-7166",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1620215"
}
],
"notes": [
{
"category": "description",
"text": "In all versions of Node.js 10 prior to 10.9.0, an argument processing flaw can cause `Buffer.alloc()` to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying `encoding` can be passed as a number, this is misinterpreted by `Buffer\u0027s` internal \"fill\" method as the `start` to a fill operation. This flaw may be abused where `Buffer.alloc()` arguments are derived from user input to return uncleared memory blocks that may contain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Unintentional exposure of uninitialized memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7166"
},
{
"category": "external",
"summary": "RHBZ#1620215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7166",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7166"
}
],
"release_date": "2018-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:15:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Unintentional exposure of uninitialized memory"
},
{
"cve": "CVE-2018-12115",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1620219"
}
],
"notes": [
{
"category": "description",
"text": "In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `\u0027ucs2\u0027`, `\u0027ucs-2\u0027`, `\u0027utf16le\u0027` and `\u0027utf-16le\u0027`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Out of bounds (OOB) write via UCS-2 encoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Openshift Container Platform 3.x versions are potentially vulnerable via the jenkins-slave-nodejs and jenkins-agent-nodejs containers. However a build would have to occur with a malicious jenkins pipeline, or nodejs source code supplied by an attacker, reducing the impact of this flaw to moderate. Both container images used nodejs delivered from Red Hat Software Collections.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12115"
},
{
"category": "external",
"summary": "RHBZ#1620219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12115",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12115"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12115",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12115"
}
],
"release_date": "2018-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-22T21:15:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
},
{
"category": "workaround",
"details": "On Openshift Container Platform 3.x you can override the container image used on the Jenkins Slave by specifying the JENKINS_SLAVE_IMAGE environment variable in your jenkins deployment configuration. Ref:\n\nhttps://github.com/openshift/jenkins/blob/8e1ab16fb5f44d6570018c5dfa3407692fdba6e5/2/contrib/jenkins/kube-slave-common.sh#L27-L33",
"product_ids": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOAR-NODEJS-10:npm-1:6.2.0-1.10.9.0.1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.src",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-debuginfo-1:10.9.0-1.el7.x86_64",
"7Server-RH7-RHOAR-NODEJS-10:rhoar-nodejs-docs-1:10.9.0-1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Out of bounds (OOB) write via UCS-2 encoding"
}
]
}
RHSA-2019_1297
Vulnerability from csaf_redhat - Published: 2019-05-30 14:57 - Updated: 2024-11-22 12:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for JBoss Core Services on RHEL 6 and RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 2 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1297",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "JBCS-620",
"url": "https://issues.redhat.com/browse/JBCS-620"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1297.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update",
"tracking": {
"current_release_date": "2024-11-22T12:07:43+00:00",
"generator": {
"date": "2024-11-22T12:07:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1297",
"initial_release_date": "2019-05-30T14:57:48+00:00",
"revision_history": [
{
"date": "2019-05-30T14:57:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-05-30T14:57:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T12:07:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:57:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:57:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-30T14:57:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
}
]
}
RHSA-2018_3221
Vulnerability from csaf_redhat - Published: 2018-10-30 11:11 - Updated: 2024-11-22 12:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739)\n\n* openssl: Malformed X.509 IPAdressFamily could cause OOB read (CVE-2017-3735)\n\n* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3221",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index"
},
{
"category": "external",
"summary": "1486144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486144"
},
{
"category": "external",
"summary": "1548401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548401"
},
{
"category": "external",
"summary": "1561266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561266"
},
{
"category": "external",
"summary": "1568253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253"
},
{
"category": "external",
"summary": "1585004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585004"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "1603597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1603597"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3221.json"
}
],
"title": "Red Hat Security Advisory: openssl security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T12:08:01+00:00",
"generator": {
"date": "2024-11-22T12:08:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:3221",
"initial_release_date": "2018-10-30T11:11:49+00:00",
"revision_history": [
{
"date": "2018-10-30T11:11:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T11:11:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T12:08:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-static-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"product_id": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686",
"product_id": "openssl-libs-1:1.0.2k-16.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686",
"product_id": "openssl-devel-1:1.0.2k-16.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.i686",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.i686",
"product_id": "openssl-static-1:1.0.2k-16.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.src",
"product": {
"name": "openssl-1:1.0.2k-16.el7.src",
"product_id": "openssl-1:1.0.2k-16.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.ppc",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc",
"product_id": "openssl-libs-1:1.0.2k-16.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.ppc",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc",
"product_id": "openssl-devel-1:1.0.2k-16.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.ppc",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc",
"product_id": "openssl-static-1:1.0.2k-16.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-static-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"product_id": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.s390",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390",
"product_id": "openssl-libs-1:1.0.2k-16.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.s390",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390",
"product_id": "openssl-devel-1:1.0.2k-16.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.s390",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.s390",
"product_id": "openssl-static-1:1.0.2k-16.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-libs-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-devel-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-static-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.s390x",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x",
"product_id": "openssl-perl-1:1.0.2k-16.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-static-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-16.el7.aarch64",
"product": {
"name": "openssl-1:1.0.2k-16.el7.aarch64",
"product_id": "openssl-1:1.0.2k-16.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-16.el7?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src"
},
"product_reference": "openssl-1:1.0.2k-16.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-16.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-16.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-3735",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1486144"
}
],
"notes": [
{
"category": "description",
"text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malformed X.509 IPAdressFamily could cause OOB read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only exhibits itself when:\n1. OpenSSL is used to display details of a local or a remote certificate.\n2. The certificate contains the uncommon RFC 3779 IPAddressFamily extension.\n\nThe maximum impact of this flaw is garbled information being displayed, there is no impact on the availability of service using such a certificate. Also this flaw can NOT be used to create specially-crafted certificates. Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-3735"
},
{
"category": "external",
"summary": "RHBZ#1486144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3735",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3735"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20170828.txt",
"url": "https://www.openssl.org/news/secadv/20170828.txt"
}
],
"release_date": "2017-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: Malformed X.509 IPAdressFamily could cause OOB read"
},
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2018-0737",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2018-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1568253"
}
],
"notes": [
{
"category": "description",
"text": "OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0737"
},
{
"category": "external",
"summary": "RHBZ#1568253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2018/04/16/3",
"url": "http://www.openwall.com/lists/oss-security/2018/04/16/3"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180416.txt",
"url": "https://www.openssl.org/news/secadv/20180416.txt"
}
],
"release_date": "2018-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys"
},
{
"cve": "CVE-2018-0739",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561266"
}
],
"notes": [
{
"category": "description",
"text": "Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0739"
},
{
"category": "external",
"summary": "RHBZ#1561266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0739"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180327.txt",
"url": "https://www.openssl.org/news/secadv/20180327.txt"
}
],
"release_date": "2018-03-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T11:11:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Client-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Client-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7ComputeNode-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7ComputeNode-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-Alt-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-Alt-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Server-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Server-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-7.6:openssl-static-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.src",
"7Workstation-optional-7.6:openssl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-debuginfo-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-devel-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-libs-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-perl-1:1.0.2k-16.el7.x86_64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.aarch64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.i686",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.ppc64le",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.s390x",
"7Workstation-optional-7.6:openssl-static-1:1.0.2k-16.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service"
}
]
}
RHSA-2019:1543
Vulnerability from csaf_redhat - Published: 2019-06-18 19:08 - Updated: 2026-02-20 19:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)\n\n* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)\n\n* curl: HTTP authentication leak in redirects (CVE-2018-1000007)\n\n* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)\n\n* curl: RTSP RTP buffer over-read (CVE-2018-1000122)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1543",
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29"
},
{
"category": "external",
"summary": "1536013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536013"
},
{
"category": "external",
"summary": "1537125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537125"
},
{
"category": "external",
"summary": "1552628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552628"
},
{
"category": "external",
"summary": "1553398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553398"
},
{
"category": "external",
"summary": "1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "1595985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595985"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "JBCS-722",
"url": "https://issues.redhat.com/browse/JBCS-722"
},
{
"category": "external",
"summary": "JBCS-750",
"url": "https://issues.redhat.com/browse/JBCS-750"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1543.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update",
"tracking": {
"current_release_date": "2026-02-20T19:40:09+00:00",
"generator": {
"date": "2026-02-20T19:40:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2019:1543",
"initial_release_date": "2019-06-18T19:08:49+00:00",
"revision_history": [
{
"date": "2019-06-18T19:08:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-18T19:08:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-20T19:40:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product": {
"name": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product_id": "JBoss Core Services Apache HTTP Server 2.4.29 SP2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0495",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591163"
}
],
"notes": [
{
"category": "description",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "RHBZ#1591163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0495"
},
{
"category": "external",
"summary": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1591100"
}
],
"notes": [
{
"category": "description",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "RHBZ#1591100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20180612.txt",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
}
],
"release_date": "2018-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang"
},
{
"cve": "CVE-2018-14404",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595985"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14404"
},
{
"category": "external",
"summary": "RHBZ#1595985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595985"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14404"
}
],
"release_date": "2018-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Harry Sintonen"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16839",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2018-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1642201"
}
],
"notes": [
{
"category": "description",
"text": "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16839"
},
{
"category": "external",
"summary": "RHBZ#1642201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16839"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16839",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16839"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16839.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16839.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16840",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1642203"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an \u0027easy\u0027 handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Use-after-free when closing \"easy\" handle in Curl_close()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16840"
},
{
"category": "external",
"summary": "RHBZ#1642203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16840",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16840"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16840",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16840"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16840.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16840.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Use-after-free when closing \"easy\" handle in Curl_close()"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16842",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-10-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1644124"
}
],
"notes": [
{
"category": "description",
"text": "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Heap-based buffer over-read in the curl tool warning formatting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16842"
},
{
"category": "external",
"summary": "RHBZ#1644124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644124"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16842"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16842"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16842.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16842.html"
}
],
"release_date": "2018-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Heap-based buffer over-read in the curl tool warning formatting"
},
{
"acknowledgments": [
{
"names": [
"Daniel Stenberg"
],
"organization": "the Curl project"
},
{
"names": [
"Wenxiang Qian"
],
"organization": "Tencent Blade Team",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-16890",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1670252"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: NTLM type-2 heap out-of-bounds buffer read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16890"
},
{
"category": "external",
"summary": "RHBZ#1670252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16890",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16890"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2018-16890.html",
"url": "https://curl.haxx.se/docs/CVE-2018-16890.html"
}
],
"release_date": "2019-02-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "Turn off NTLM authentication.",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: NTLM type-2 heap out-of-bounds buffer read"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Zhouyihai Ding"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000005",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1536013"
}
],
"notes": [
{
"category": "description",
"text": "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn\u0027t updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Out-of-bounds read in code handling HTTP/2 trailers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was introduced in curl-7.49.0. Therefore the versions of curl shipped with Red Hat Enterprise Linux 5, 6 and 7 and Red Hat Ceph Storage 2 are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000005"
},
{
"category": "external",
"summary": "RHBZ#1536013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000005",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-824a.html",
"url": "https://curl.haxx.se/docs/adv_2018-824a.html"
}
],
"release_date": "2018-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Out-of-bounds read in code handling HTTP/2 trailers"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Craig de Stigter"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000007",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-01-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1537125"
}
],
"notes": [
{
"category": "description",
"text": "It was found that curl and libcurl might send their Authentication header to a third party HTTP server upon receiving an HTTP REDIRECT reply. This could leak authentication token to external entities.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: HTTP authentication leak in redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of curl as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of httpd24-curl as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000007"
},
{
"category": "external",
"summary": "RHBZ#1537125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-b3bf.html",
"url": "https://curl.haxx.se/docs/adv_2018-b3bf.html"
}
],
"release_date": "2018-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "By default, curl and libcurl will not follow redirect requests.\nThis flaw happens only when curl or libcurl are explicitly requested to follow redirects (option --location in curl, and CURLOPT_FOLLOWLOCATION in libcurl).\nTo mitigate this, it is possible to prevent the automated following of redirects, replacing it by manual redirects (and remove the authentication header), for example.",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: HTTP authentication leak in redirects"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Duy Phan Thanh"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000120",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1552628"
}
],
"notes": [
{
"category": "description",
"text": "It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash or an unspecified behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: FTP path trickery leads to NIL byte out of bounds write",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000120"
},
{
"category": "external",
"summary": "RHBZ#1552628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-9cd6.html",
"url": "https://curl.haxx.se/docs/adv_2018-9cd6.html"
}
],
"release_date": "2018-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: FTP path trickery leads to NIL byte out of bounds write"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Dario Weisser"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000121",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1552631"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: LDAP NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000121"
},
{
"category": "external",
"summary": "RHBZ#1552631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-97a2.html",
"url": "https://curl.haxx.se/docs/adv_2018-97a2.html"
}
],
"release_date": "2018-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: LDAP NULL pointer dereference"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Max Dymond"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-1000122",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1553398"
}
],
"notes": [
{
"category": "description",
"text": "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: RTSP RTP buffer over-read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000122"
},
{
"category": "external",
"summary": "RHBZ#1553398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/adv_2018-b047.html",
"url": "https://curl.haxx.se/docs/adv_2018-b047.html"
}
],
"release_date": "2018-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: RTSP RTP buffer over-read"
},
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
},
{
"acknowledgments": [
{
"names": [
"Daniel Stenberg"
],
"organization": "the Curl project"
},
{
"names": [
"Wenxiang Qian"
],
"organization": "Tencent Blade Team",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3822",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1670254"
}
],
"notes": [
{
"category": "description",
"text": "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: NTLMv2 type-3 header stack buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3822"
},
{
"category": "external",
"summary": "RHBZ#1670254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670254"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3822"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3822",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3822"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2019-3822.html",
"url": "https://curl.haxx.se/docs/CVE-2019-3822.html"
}
],
"release_date": "2019-02-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "Turn off NTLM authentication.",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: NTLMv2 type-3 header stack buffer overflow"
},
{
"acknowledgments": [
{
"names": [
"Daniel Stenberg"
],
"organization": "the Curl project"
},
{
"names": [
"Brian Carpenter"
],
"organization": "Geeknik Labs",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-3823",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1670256"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: SMTP end-of-response out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3823"
},
{
"category": "external",
"summary": "RHBZ#1670256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3823",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3823"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2019-3823.html",
"url": "https://curl.haxx.se/docs/CVE-2019-3823.html"
}
],
"release_date": "2019-02-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "workaround",
"details": "Do not use SMTP authentication with curl",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: SMTP end-of-response out-of-bounds read"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"l00p3r"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-5436",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1710620"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw exists if the user selects to use a \"blksize\" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.\nUsers choosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger. It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5436"
},
{
"category": "external",
"summary": "RHBZ#1710620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5436"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5436",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5436"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2019-5436.html",
"url": "https://curl.haxx.se/docs/CVE-2019-5436.html"
}
],
"release_date": "2019-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-18T19:08:49+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).",
"product_ids": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"JBoss Core Services Apache HTTP Server 2.4.29 SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function"
}
]
}
WID-SEC-W-2025-1212
Vulnerability from csaf_certbund - Published: 2019-04-16 22:00 - Updated: 2025-06-02 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Mit der Unified Communications Suite bietet Oracle eine Messaging- und Collaboration-Plattform an.\r\nOracle Communications Policy Management ist ein Produkt von Oracle und vereint mehrere Bereiche der Kommunikation.\r\nOracle Communications Unified Inventory Management (UIM) ist eine offene, standardbasierte Anwendung, die eine Bestandsaufnahme von Kommunikationsdiensten und -ressourcen erm\u00f6glicht.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1212 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2025-1212.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1212 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1212"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - April 2019 vom 2019-04-16",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixCGBU"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4218-1 vom 2019-12-11",
"url": "https://usn.ubuntu.com/4218-1/"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf"
}
],
"source_lang": "en-US",
"title": "Oracle Communications Applications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-02T22:00:00.000+00:00",
"generator": {
"date": "2025-06-03T09:23:36.426+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-1212",
"initial_release_date": "2019-04-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-04-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-04-17T22:00:00.000+00:00",
"number": "2",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-10T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "10",
"product": {
"name": "Oracle Communications EAGLE LNP Application Processor 10.0",
"product_id": "T014014",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.0"
}
}
},
{
"category": "product_version",
"name": "10.1",
"product": {
"name": "Oracle Communications EAGLE LNP Application Processor 10.1",
"product_id": "T014015",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.1"
}
}
},
{
"category": "product_version",
"name": "10.2",
"product": {
"name": "Oracle Communications EAGLE LNP Application Processor 10.2",
"product_id": "T014016",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.2"
}
}
}
],
"category": "product_name",
"name": "Communications EAGLE LNP Application Processor"
},
{
"branches": [
{
"category": "product_version",
"name": "13.1",
"product": {
"name": "Oracle Communications LSMS 13.1",
"product_id": "T006217",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_lsms:13.1"
}
}
},
{
"category": "product_version",
"name": "13.2",
"product": {
"name": "Oracle Communications LSMS 13.2",
"product_id": "T014017",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_lsms:13.2"
}
}
},
{
"category": "product_version",
"name": "13.3",
"product": {
"name": "Oracle Communications LSMS 13.3",
"product_id": "T014018",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_lsms:13.3"
}
}
}
],
"category": "product_name",
"name": "Communications LSMS"
},
{
"branches": [
{
"category": "product_version",
"name": "8.1",
"product": {
"name": "Oracle Communications Messaging Server 8.1",
"product_id": "T014019",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_messaging_server:8.1"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Oracle Communications Messaging Server 8.0",
"product_id": "T014020",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_messaging_server:8.0"
}
}
}
],
"category": "product_name",
"name": "Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version",
"name": "12.2",
"product": {
"name": "Oracle Communications Policy Management 12.2",
"product_id": "T009732",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_policy_management:12.2"
}
}
},
{
"category": "product_version",
"name": "12.1",
"product": {
"name": "Oracle Communications Policy Management 12.1",
"product_id": "T014021",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_policy_management:12.1"
}
}
},
{
"category": "product_version",
"name": "12.3",
"product": {
"name": "Oracle Communications Policy Management 12.3",
"product_id": "T014022",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_policy_management:12.3"
}
}
},
{
"category": "product_version",
"name": "12.4",
"product": {
"name": "Oracle Communications Policy Management 12.4",
"product_id": "T014023",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_policy_management:12.4"
}
}
}
],
"category": "product_name",
"name": "Communications Policy Management"
},
{
"branches": [
{
"category": "product_version",
"name": "6",
"product": {
"name": "Oracle Communications Service Broker 6.0",
"product_id": "329193",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_service_broker:6.0"
}
}
}
],
"category": "product_name",
"name": "Communications Service Broker"
},
{
"branches": [
{
"category": "product_version",
"name": "8.2.0",
"product": {
"name": "Oracle Communications Session Border Controller 8.2.0",
"product_id": "T014024",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_session_border_controller:8.2.0"
}
}
},
{
"category": "product_version",
"name": "8.1.0",
"product": {
"name": "Oracle Communications Session Border Controller 8.1.0",
"product_id": "T014025",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_session_border_controller:8.1.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0",
"product": {
"name": "Oracle Communications Session Border Controller 8.0.0",
"product_id": "T014026",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_session_border_controller:8.0.0"
}
}
}
],
"category": "product_name",
"name": "Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1.0",
"product": {
"name": "Oracle Enterprise Communications Broker 3.1.0",
"product_id": "T014030",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:enterprise_communications_broker:3.1.0"
}
}
},
{
"category": "product_version",
"name": "3.0.0",
"product": {
"name": "Oracle Enterprise Communications Broker 3.0.0",
"product_id": "T014031",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:enterprise_communications_broker:3.0.0"
}
}
}
],
"category": "product_name",
"name": "Enterprise Communications Broker"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.4.0",
"product": {
"name": "Oracle Communications Unified Inventory Management 7.4.0",
"product_id": "T013407",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.4.0"
}
}
},
{
"category": "product_version",
"name": "7.3.5",
"product": {
"name": "Oracle Communications Unified Inventory Management 7.3.5",
"product_id": "T014027",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.5"
}
}
},
{
"category": "product_version",
"name": "7.3.2",
"product": {
"name": "Oracle Communications Unified Inventory Management 7.3.2",
"product_id": "T014028",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.2"
}
}
},
{
"category": "product_version",
"name": "7.3.4",
"product": {
"name": "Oracle Communications Unified Inventory Management 7.3.4",
"product_id": "T014029",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.4"
}
}
}
],
"category": "product_name",
"name": "communications_unified_inventory_management"
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-9251",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2015-9251"
},
{
"cve": "CVE-2016-1000031",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2016-1000031"
},
{
"cve": "CVE-2016-1181",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2016-1181"
},
{
"cve": "CVE-2016-1182",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2016-1182"
},
{
"cve": "CVE-2016-7055",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2016-7055"
},
{
"cve": "CVE-2016-8735",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2016-8735"
},
{
"cve": "CVE-2017-0861",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-0861"
},
{
"cve": "CVE-2017-12617",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-12617"
},
{
"cve": "CVE-2017-15265",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-15265"
},
{
"cve": "CVE-2017-3730",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-3730"
},
{
"cve": "CVE-2017-3731",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-3731"
},
{
"cve": "CVE-2017-3732",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-3732"
},
{
"cve": "CVE-2017-3733",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-3733"
},
{
"cve": "CVE-2017-3735",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-3735"
},
{
"cve": "CVE-2017-3736",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-3736"
},
{
"cve": "CVE-2017-3738",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-3738"
},
{
"cve": "CVE-2017-5645",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-5645"
},
{
"cve": "CVE-2017-5664",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-5664"
},
{
"cve": "CVE-2017-5753",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7525",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2017-7525"
},
{
"cve": "CVE-2018-0732",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-0732"
},
{
"cve": "CVE-2018-0733",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-0733"
},
{
"cve": "CVE-2018-0734",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-0734"
},
{
"cve": "CVE-2018-0737",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-0737"
},
{
"cve": "CVE-2018-0739",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-0739"
},
{
"cve": "CVE-2018-1000004",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-1000180",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-1000180"
},
{
"cve": "CVE-2018-1000613",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-1000613"
},
{
"cve": "CVE-2018-10901",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-10901"
},
{
"cve": "CVE-2018-11039",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-11039"
},
{
"cve": "CVE-2018-11040",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-11040"
},
{
"cve": "CVE-2018-11218",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-11218"
},
{
"cve": "CVE-2018-11219",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-11219"
},
{
"cve": "CVE-2018-11236",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-11236"
},
{
"cve": "CVE-2018-11237",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-11237"
},
{
"cve": "CVE-2018-11784",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-11784"
},
{
"cve": "CVE-2018-12384",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-12384"
},
{
"cve": "CVE-2018-12404",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-12404"
},
{
"cve": "CVE-2018-1257",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-1257"
},
{
"cve": "CVE-2018-1258",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-1258"
},
{
"cve": "CVE-2018-16864",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-16864"
},
{
"cve": "CVE-2018-16865",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-16865"
},
{
"cve": "CVE-2018-16890",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-16890"
},
{
"cve": "CVE-2018-3620",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-3620"
},
{
"cve": "CVE-2018-3646",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-3646"
},
{
"cve": "CVE-2018-3693",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-3693"
},
{
"cve": "CVE-2018-6485",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-6485"
},
{
"cve": "CVE-2018-7489",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-7489"
},
{
"cve": "CVE-2018-7566",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2018-7566"
},
{
"cve": "CVE-2019-3822",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2019-3822"
},
{
"cve": "CVE-2019-3823",
"product_status": {
"known_affected": [
"T009732",
"T013407",
"T014018",
"T014029",
"T006217",
"T014019",
"T014016",
"T014027",
"T014017",
"T014028",
"T014014",
"T014025",
"T002977",
"T014015",
"T014026",
"T014023",
"T014024",
"T014021",
"T014022",
"T014030",
"T014020",
"T014031",
"329193",
"T000126"
]
},
"release_date": "2019-04-16T22:00:00.000+00:00",
"title": "CVE-2019-3823"
}
]
}
WID-SEC-W-2022-1413
Vulnerability from csaf_certbund - Published: 2018-06-12 22:00 - Updated: 2024-06-03 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance\n- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1413 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2022-1413.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1413 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1413"
},
{
"category": "external",
"summary": "OpenSSL Security Advisory vom 2018-06-12",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3692-1 vom 2018-06-27",
"url": "http://www.ubuntu.com/usn/usn-3692-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1887-1 vom 2018-07-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181887-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1968-1 vom 2018-07-16",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181968-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2041-1 vom 2018-07-24",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182041-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2036-1 vom 2018-07-24",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182036-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2207-1 vom 2018-08-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182207-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2449-1 vom 2018-08-20",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182449-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2534-1 vom 2018-08-28",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2545-1 vom 2018-08-29",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182545-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2683-1 vom 2018-09-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182683-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2956-1 vom 2018-09-30",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182956-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2965-1 vom 2018-10-02",
"url": "http://www.auscert.org.au/bulletins/69130"
},
{
"category": "external",
"summary": "Palo Alto Networks Security Advisory",
"url": "https://securityadvisories.paloaltonetworks.com/(X(1)S(ail5o3zckluehpmm4upvcd2c))/Home/Detail/133"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4248 vom 2018-10-13",
"url": "http://linux.oracle.com/errata/ELSA-2018-4248.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4249 vom 2018-10-13",
"url": "http://linux.oracle.com/errata/ELSA-2018-4249.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4254 vom 2018-10-16",
"url": "http://linux.oracle.com/errata/ELSA-2018-4254.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4253 vom 2018-10-16",
"url": "http://linux.oracle.com/errata/ELSA-2018-4253.html"
},
{
"category": "external",
"summary": "Tenable Security Advisory TNS-2018-14",
"url": "https://www.tenable.com/security/tns-2018-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:3221 vom 2018-10-31",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20181105-0001 vom 2018-11-05",
"url": "https://security.netapp.com/advisory/ntap-20181105-0001/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-3221 vom 2018-11-06",
"url": "http://linux.oracle.com/errata/ELSA-2018-3221.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4267 vom 2018-11-07",
"url": "http://linux.oracle.com/errata/ELSA-2018-4267.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4348 vom 2018-12-01",
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4355 vom 2018-12-20",
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4581 vom 2019-03-13",
"url": "http://linux.oracle.com/errata/ELSA-2019-4581.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA10990 vom 2020-01-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10990\u0026actp=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1296 vom 2019-05-30",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1297 vom 2019-05-30",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1553-1 vom 2019-06-19",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191553-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1543 vom 2019-06-19",
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2471 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2471.html"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0040 vom 2019-08-15",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-August/000956.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4747 vom 2019-08-16",
"url": "http://linux.oracle.com/errata/ELSA-2019-4747.html"
},
{
"category": "external",
"summary": "Pulse Secure Security Advisory SA44073 vom 2020-06-23",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44073-2019-03-Security-Bulletin-Multiple-vulnerabilities-resolved-in-Pulse-Connect-Secure-Pulse-Policy-Secure-Pulse-Secure-Desktop-9-0R4-8-3R7/?kA23Z000000KBrjSAG="
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9150 vom 2021-04-01",
"url": "https://linux.oracle.com/errata/ELSA-2021-9150.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-9272 vom 2022-04-08",
"url": "https://linux.oracle.com/errata/ELSA-2022-9272.html"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2022-627 vom 2022-09-14",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-627"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN HPESBST04367 rev.1 vom 2022-09-21",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04367en_us"
},
{
"category": "external",
"summary": "Dell Knowledge Base Article",
"url": "https://www.dell.com/support/kbdoc/en-us/000221474/dsa-2024-059-security-update-for-dell-networker-multiple-components-vulnerabilities"
},
{
"category": "external",
"summary": "SolarWinds Platform 2024.2 release notes vom 2024-06-04",
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm"
}
],
"source_lang": "en-US",
"title": "OpenSSL: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-06-03T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:35:07.370+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-1413",
"initial_release_date": "2018-06-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2018-06-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2018-06-12T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-06-26T22:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2018-07-05T22:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2018-07-16T22:00:00.000+00:00",
"number": "5",
"summary": "New remediations available"
},
{
"date": "2018-07-23T22:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2018-08-06T22:00:00.000+00:00",
"number": "7",
"summary": "New remediations available"
},
{
"date": "2018-08-20T22:00:00.000+00:00",
"number": "8",
"summary": "New remediations available"
},
{
"date": "2018-08-20T22:00:00.000+00:00",
"number": "9",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-08-20T22:00:00.000+00:00",
"number": "10",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-08-21T22:00:00.000+00:00",
"number": "11",
"summary": "Added references"
},
{
"date": "2018-08-28T22:00:00.000+00:00",
"number": "12",
"summary": "New remediations available"
},
{
"date": "2018-09-10T22:00:00.000+00:00",
"number": "13",
"summary": "New remediations available"
},
{
"date": "2018-09-23T22:00:00.000+00:00",
"number": "14",
"summary": "Added references"
},
{
"date": "2018-09-24T22:00:00.000+00:00",
"number": "15",
"summary": "Added references"
},
{
"date": "2018-09-30T22:00:00.000+00:00",
"number": "16",
"summary": "New remediations available"
},
{
"date": "2018-10-01T22:00:00.000+00:00",
"number": "17",
"summary": "New remediations available"
},
{
"date": "2018-10-11T22:00:00.000+00:00",
"number": "18",
"summary": "New remediations available"
},
{
"date": "2018-10-14T22:00:00.000+00:00",
"number": "19",
"summary": "New remediations available"
},
{
"date": "2018-10-15T22:00:00.000+00:00",
"number": "20",
"summary": "New remediations available"
},
{
"date": "2018-10-28T23:00:00.000+00:00",
"number": "21",
"summary": "New remediations available"
},
{
"date": "2018-10-30T23:00:00.000+00:00",
"number": "22",
"summary": "New remediations available"
},
{
"date": "2018-11-05T23:00:00.000+00:00",
"number": "23",
"summary": "New remediations available"
},
{
"date": "2018-11-06T23:00:00.000+00:00",
"number": "24",
"summary": "New remediations available"
},
{
"date": "2018-11-08T23:00:00.000+00:00",
"number": "25",
"summary": "Added references"
},
{
"date": "2018-12-02T23:00:00.000+00:00",
"number": "26",
"summary": "New remediations available"
},
{
"date": "2018-12-19T23:00:00.000+00:00",
"number": "27",
"summary": "New remediations available"
},
{
"date": "2019-01-06T23:00:00.000+00:00",
"number": "28",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-03-13T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-05-30T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-06-18T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2019-08-13T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-15T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle"
},
{
"date": "2019-08-18T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-09-10T22:00:00.000+00:00",
"number": "35",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-9A0A7C0986, FEDORA-2019-00C25B9379"
},
{
"date": "2019-09-11T22:00:00.000+00:00",
"number": "36",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-DB06EFDEA1"
},
{
"date": "2020-01-08T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-06-23T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Pulse Secure aufgenommen"
},
{
"date": "2021-03-31T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-04-10T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-09-13T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2022-09-20T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2024-01-25T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-06-03T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "44"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c19.10",
"product": {
"name": "Dell NetWorker \u003c19.10",
"product_id": "T032354"
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "HPE Fabric OS",
"product": {
"name": "HPE Fabric OS",
"product_id": "T017798",
"product_identification_helper": {
"cpe": "cpe:/o:hpe:fabric_os:9.0.0a"
}
}
},
{
"category": "product_name",
"name": "HPE Fabric OS",
"product": {
"name": "HPE Fabric OS",
"product_id": "T019403",
"product_identification_helper": {
"cpe": "cpe:/o:hpe:fabric_os:-"
}
}
}
],
"category": "product_name",
"name": "Fabric OS"
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "5930",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.0.2p",
"product": {
"name": "Open Source OpenSSL \u003c1.0.2p",
"product_id": "T012064"
}
},
{
"category": "product_version_range",
"name": "\u003c1.1.0i",
"product": {
"name": "Open Source OpenSSL \u003c1.1.0i",
"product_id": "T012391"
}
}
],
"category": "product_name",
"name": "OpenSSL"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.1.4",
"product": {
"name": "PaloAlto Networks PAN-OS \u003c8.1.4",
"product_id": "T012878"
}
}
],
"category": "product_name",
"name": "PAN-OS"
}
],
"category": "vendor",
"name": "PaloAlto Networks"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2024.2",
"product": {
"name": "SolarWinds Platform \u003c2024.2",
"product_id": "T035149"
}
}
],
"category": "product_name",
"name": "Platform"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.0",
"product": {
"name": "Tenable Security Nessus \u003c8.0.0",
"product_id": "T013006"
}
}
],
"category": "product_name",
"name": "Nessus"
}
],
"category": "vendor",
"name": "Tenable Security"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in OpenSSL in [crypto/dh/dh_key.c] bez\u00fcglich des Schl\u00fcsselaustauschs im TLS Handshake bei Verwendung einer DH(E) basierten Ciphersuite. Ein Angreifer, der einen malizi\u00f6sen Server kontrolliert, kann einen sehr gro\u00dfen Primzahlwert an den Client senden, wodurch dieser sehr lange Zeit mit der Schl\u00fcsselgenerierung verbringt. Dies kann f\u00fcr einen Denial of Service Angriff genutzt werden. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T011119",
"T019403",
"T035149",
"2951",
"T002207",
"T017798",
"67646",
"T000126",
"5930",
"T004914",
"T032354"
]
},
"release_date": "2018-06-12T22:00:00.000+00:00",
"title": "CVE-2018-0732"
}
]
}
WID-SEC-W-2023-1594
Vulnerability from csaf_certbund - Published: 2023-06-28 22:00 - Updated: 2023-06-28 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Tivoli Network Manager ist eine Netzanalysesoftware f\u00fcr das Management komplexer Netze. Diese Software erfasst und verteilt Layer-2- und Layer-3-Netzdaten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Tivoli Network Manager ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1594 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1594.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1594 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1594"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/885316"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/884276"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/883428"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/883424"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/882926"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/882898"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/882888"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/880403"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/880401"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/880395"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/879855"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/879841"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/870546"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/870526"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/870508"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/870504"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/870500"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/870498"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/743933"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/739297"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/739271"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/739249"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/739247"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/739245"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/739243"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/738231"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/731931"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/730883"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/730871"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/730845"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/730835"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/730171"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/720307"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/720283"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/720265"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/718745"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/717345"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/717335"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/717327"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/717007"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/716573"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/712213"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/712199"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/570557"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/569765"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/569727"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/569717"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/305321"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/304091"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/304089"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/303663"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-06-28",
"url": "https://www.ibm.com/support/pages/node/303657"
}
],
"source_lang": "en-US",
"title": "IBM Tivoli Network Manager: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-28T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:53:31.776+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1594",
"initial_release_date": "2023-06-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 5",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 5",
"product_id": "T028343",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9_fix_pack_5"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9",
"product_id": "T028344",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Network Manager IP Edition \u003c 4.1.1",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c 4.1.1",
"product_id": "T028345",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__4.1.1"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Network Manager IP Edition \u003c 4.2",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c 4.2",
"product_id": "T028346",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__4.2"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.4",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.4",
"product_id": "T028347",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9.0.4"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.5",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.5",
"product_id": "T028348",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9.0.5"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 4",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 4",
"product_id": "T028349",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9_fix_pack_4"
}
}
}
],
"category": "product_name",
"name": "Tivoli Network Manager"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-4046",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-4046"
},
{
"cve": "CVE-2019-4030",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-4030"
},
{
"cve": "CVE-2019-2684",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2684"
},
{
"cve": "CVE-2019-2602",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2602"
},
{
"cve": "CVE-2019-2537",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2537"
},
{
"cve": "CVE-2019-2534",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2534"
},
{
"cve": "CVE-2019-2531",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2531"
},
{
"cve": "CVE-2019-2529",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2529"
},
{
"cve": "CVE-2019-2503",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2503"
},
{
"cve": "CVE-2019-2482",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2482"
},
{
"cve": "CVE-2019-2481",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2481"
},
{
"cve": "CVE-2019-2455",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-2455"
},
{
"cve": "CVE-2019-1559",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-1559"
},
{
"cve": "CVE-2019-0220",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2019-0220"
},
{
"cve": "CVE-2018-8039",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-8039"
},
{
"cve": "CVE-2018-5407",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-5407"
},
{
"cve": "CVE-2018-3282",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3282"
},
{
"cve": "CVE-2018-3278",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3278"
},
{
"cve": "CVE-2018-3276",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3276"
},
{
"cve": "CVE-2018-3251",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3251"
},
{
"cve": "CVE-2018-3247",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3247"
},
{
"cve": "CVE-2018-3174",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3174"
},
{
"cve": "CVE-2018-3156",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3156"
},
{
"cve": "CVE-2018-3143",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3143"
},
{
"cve": "CVE-2018-3123",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3123"
},
{
"cve": "CVE-2018-3084",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3084"
},
{
"cve": "CVE-2018-3082",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3082"
},
{
"cve": "CVE-2018-3081",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3081"
},
{
"cve": "CVE-2018-3080",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3080"
},
{
"cve": "CVE-2018-3079",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3079"
},
{
"cve": "CVE-2018-3078",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3078"
},
{
"cve": "CVE-2018-3077",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3077"
},
{
"cve": "CVE-2018-3075",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3075"
},
{
"cve": "CVE-2018-3074",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3074"
},
{
"cve": "CVE-2018-3073",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3073"
},
{
"cve": "CVE-2018-3071",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3071"
},
{
"cve": "CVE-2018-3070",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3070"
},
{
"cve": "CVE-2018-3067",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3067"
},
{
"cve": "CVE-2018-3066",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3066"
},
{
"cve": "CVE-2018-3065",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3065"
},
{
"cve": "CVE-2018-3064",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3064"
},
{
"cve": "CVE-2018-3063",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3063"
},
{
"cve": "CVE-2018-3062",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3062"
},
{
"cve": "CVE-2018-3061",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3061"
},
{
"cve": "CVE-2018-3060",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3060"
},
{
"cve": "CVE-2018-3058",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3058"
},
{
"cve": "CVE-2018-3056",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3056"
},
{
"cve": "CVE-2018-3054",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-3054"
},
{
"cve": "CVE-2018-2877",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2877"
},
{
"cve": "CVE-2018-2846",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2846"
},
{
"cve": "CVE-2018-2839",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2839"
},
{
"cve": "CVE-2018-2819",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2819"
},
{
"cve": "CVE-2018-2818",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2818"
},
{
"cve": "CVE-2018-2817",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2817"
},
{
"cve": "CVE-2018-2816",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2816"
},
{
"cve": "CVE-2018-2813",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2813"
},
{
"cve": "CVE-2018-2812",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2812"
},
{
"cve": "CVE-2018-2810",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2810"
},
{
"cve": "CVE-2018-2805",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2805"
},
{
"cve": "CVE-2018-2787",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2787"
},
{
"cve": "CVE-2018-2786",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2786"
},
{
"cve": "CVE-2018-2784",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2784"
},
{
"cve": "CVE-2018-2782",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2782"
},
{
"cve": "CVE-2018-2781",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2781"
},
{
"cve": "CVE-2018-2780",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2780"
},
{
"cve": "CVE-2018-2779",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2779"
},
{
"cve": "CVE-2018-2778",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2778"
},
{
"cve": "CVE-2018-2777",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2777"
},
{
"cve": "CVE-2018-2776",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2776"
},
{
"cve": "CVE-2018-2775",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2775"
},
{
"cve": "CVE-2018-2773",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2773"
},
{
"cve": "CVE-2018-2771",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2771"
},
{
"cve": "CVE-2018-2769",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2769"
},
{
"cve": "CVE-2018-2766",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2766"
},
{
"cve": "CVE-2018-2762",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2762"
},
{
"cve": "CVE-2018-2761",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2761"
},
{
"cve": "CVE-2018-2759",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2759"
},
{
"cve": "CVE-2018-2758",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2758"
},
{
"cve": "CVE-2018-2755",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2755"
},
{
"cve": "CVE-2018-2598",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-2598"
},
{
"cve": "CVE-2018-1996",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1996"
},
{
"cve": "CVE-2018-1926",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1926"
},
{
"cve": "CVE-2018-1904",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1904"
},
{
"cve": "CVE-2018-1902",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1902"
},
{
"cve": "CVE-2018-1901",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1901"
},
{
"cve": "CVE-2018-1798",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1798"
},
{
"cve": "CVE-2018-1797",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1797"
},
{
"cve": "CVE-2018-1794",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1794"
},
{
"cve": "CVE-2018-1793",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1793"
},
{
"cve": "CVE-2018-1777",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1777"
},
{
"cve": "CVE-2018-1770",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1770"
},
{
"cve": "CVE-2018-1767",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1767"
},
{
"cve": "CVE-2018-1719",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1719"
},
{
"cve": "CVE-2018-1695",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1695"
},
{
"cve": "CVE-2018-1656",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1656"
},
{
"cve": "CVE-2018-1643",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1643"
},
{
"cve": "CVE-2018-1621",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1621"
},
{
"cve": "CVE-2018-1614",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1614"
},
{
"cve": "CVE-2018-1567",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1567"
},
{
"cve": "CVE-2018-1447",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1447"
},
{
"cve": "CVE-2018-1428",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1428"
},
{
"cve": "CVE-2018-1427",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1427"
},
{
"cve": "CVE-2018-1426",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1426"
},
{
"cve": "CVE-2018-1301",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-1301"
},
{
"cve": "CVE-2018-12539",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-12539"
},
{
"cve": "CVE-2018-10237",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-10237"
},
{
"cve": "CVE-2018-0734",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-0734"
},
{
"cve": "CVE-2018-0732",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2018-0732"
},
{
"cve": "CVE-2017-9798",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-9798"
},
{
"cve": "CVE-2017-3738",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-3738"
},
{
"cve": "CVE-2017-3737",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-3737"
},
{
"cve": "CVE-2017-3736",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-3736"
},
{
"cve": "CVE-2017-3735",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-3735"
},
{
"cve": "CVE-2017-3732",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-3732"
},
{
"cve": "CVE-2017-1743",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-1743"
},
{
"cve": "CVE-2017-1741",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-1741"
},
{
"cve": "CVE-2017-1731",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-1731"
},
{
"cve": "CVE-2017-1681",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-1681"
},
{
"cve": "CVE-2017-15715",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-15715"
},
{
"cve": "CVE-2017-15710",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-15710"
},
{
"cve": "CVE-2017-12624",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-12624"
},
{
"cve": "CVE-2017-12618",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-12618"
},
{
"cve": "CVE-2017-12613",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2017-12613"
},
{
"cve": "CVE-2016-0705",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2016-0705"
},
{
"cve": "CVE-2016-0702",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2016-0702"
},
{
"cve": "CVE-2016-0701",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2016-0701"
},
{
"cve": "CVE-2015-0899",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2015-0899"
},
{
"cve": "CVE-2014-7810",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2014-7810"
},
{
"cve": "CVE-2012-5783",
"notes": [
{
"category": "description",
"text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen."
}
],
"release_date": "2023-06-28T22:00:00.000+00:00",
"title": "CVE-2012-5783"
}
]
}
NCSC-2024-0239
Vulnerability from csaf_ncscnl - Published: 2024-06-07 06:26 - Updated: 2024-06-07 06:26Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Solarwinds heeft kwetsbaarheden verholpen in Solarwinds Platform.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, een command-injection uit te voeren, of om een Cross-Site-Scripting-aanval uit te voeren. Een dergelijke aanval kan leiden tot uitvoer van willekeurige code in de browser van het slachtoffer.\n\nVoor succesvol misbruik moet de kwaadwillende voorafgaande authenticatie hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Solarwinds heeft updates uitgebracht om de kwetsbaarheden te verhelpen in Solarwinds Platform 2024.2\n\nIn deze updates zijn tevens kwetsbaarheden verholpen in onderliggende third-party software waar het platform gebruik van maakt. Voor deze kwetsbaarheden zijn eerdere beveiligingsadviezen gepubliceerd.\n\nZie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Incorrect Calculation",
"title": "CWE-682"
},
{
"category": "general",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
},
{
"category": "general",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28996"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28999"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-29004"
}
],
"title": "Kwetsbaarheden verholpen in Solarwinds Platform",
"tracking": {
"current_release_date": "2024-06-07T06:26:01.172456Z",
"id": "NCSC-2024-0239",
"initial_release_date": "2024-06-07T06:26:01.172456Z",
"revision_history": [
{
"date": "2024-06-07T06:26:01.172456Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "solarwinds_platform_",
"product": {
"name": "solarwinds_platform_",
"product_id": "CSAFPID-1463738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:solarwinds_:solarwinds_platform_:2024.1.1_and_previous_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solarwinds_platform",
"product": {
"name": "solarwinds_platform",
"product_id": "CSAFPID-1463740",
"product_identification_helper": {
"cpe": "cpe:2.3:a:solarwinds_:solarwinds_platform:2024.1.1_and_previous_versions_:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "solarwinds_"
},
{
"branches": [
{
"category": "product_name",
"name": "orion_platform",
"product": {
"name": "orion_platform",
"product_id": "CSAFPID-1463455",
"product_identification_helper": {
"cpe": "cpe:2.3:a:solarwinds:orion_platform:2024.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "orion_platform",
"product": {
"name": "orion_platform",
"product_id": "CSAFPID-1463456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:solarwinds:orion_platform:2024.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solarwinds_platform_",
"product": {
"name": "solarwinds_platform_",
"product_id": "CSAFPID-1463739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:solarwinds:solarwinds_platform_:2024.1.1_and_previous_versions_:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "solarwinds"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-3736",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"notes": [
{
"category": "other",
"text": "Incorrect Calculation",
"title": "CWE-682"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2017-3736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-3736.json"
}
],
"title": "CVE-2017-3736"
},
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2018-0732",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2018/CVE-2018-0732.json"
}
],
"title": "CVE-2018-0732"
},
{
"cve": "CVE-2018-0737",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2018-0737",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2018/CVE-2018-0737.json"
}
],
"title": "CVE-2018-0737"
},
{
"cve": "CVE-2019-1559",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-1559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-1559.json"
}
],
"title": "CVE-2019-1559"
},
{
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2020-1971",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1971.json"
}
],
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2021-3712",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3712",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3712.json"
}
],
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-4321",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Policy with Untrusted Domains"
},
"notes": [
{
"category": "other",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-4321",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4321.json"
}
],
"title": "CVE-2021-4321"
},
{
"cve": "CVE-2021-23840",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-23840",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23840.json"
}
],
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2022-0778",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-0778",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0778.json"
}
],
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0215",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json"
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-704",
"name": "Incorrect Type Conversion or Cast"
},
"notes": [
{
"category": "other",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0286",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json"
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2024-28996",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1463739"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28996.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1463739"
]
}
],
"title": "CVE-2024-28996"
},
{
"cve": "CVE-2024-28999",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1463740"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1463740"
]
}
],
"title": "CVE-2024-28999"
},
{
"cve": "CVE-2024-29004",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1463738"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1463738"
]
}
],
"title": "CVE-2024-29004"
}
]
}
ICSA-21-159-08
Vulnerability from csaf_cisa - Published: 2021-06-08 00:00 - Updated: 2025-05-06 06:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting this vulnerability to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"notes": [
{
"category": "summary",
"text": "The latest update for TIM 1531 IRC fixes a vulnerability that could allow a remote attacker to cause a denial-of-service under certain circumstances.\n\nSiemens has released an update for the TIM 1531 IRC and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-419820.json"
},
{
"category": "self",
"summary": "SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-419820.txt"
},
{
"category": "self",
"summary": "SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-159-08 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-159-08.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-159-08 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-159-08"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens TIM 1531 IRC",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-21-159-08",
"initial_release_date": "2021-06-08T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-06-08T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "2",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.2",
"product": {
"name": "TIM 1531 IRC (incl. SIPLUS NET variants)",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "TIM 1531 IRC (incl. SIPLUS NET variants)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2018-0732 - TIM 1531 IRC (incl. SIPLUS NET variants)",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109798331"
},
{
"summary": "CVE-2018-0732 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2018-0732.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109798331"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2018-0732"
}
]
}
SUSE-SU-2018:2207-1
Vulnerability from csaf_suse - Published: 2018-08-06 07:58 - Updated: 2018-08-06 07:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl fixes the following issues:\n\n- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based\n ciphersuite a malicious server could have sent a very large prime value to the\n client. This caused the client to spend an unreasonably long period of time\n generating a key for this prime resulting in a hang until the client has\n finished. This could be exploited in a Denial Of Service attack (bsc#1097158).\n- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-openssl-13713,sleposp3-openssl-13713,slessp3-openssl-13713,slessp4-openssl-13713,slestso13-openssl-13713",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2207-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2207-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182207-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2207-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html"
},
{
"category": "self",
"summary": "SUSE Bug 1097158",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "self",
"summary": "SUSE Bug 1097624",
"url": "https://bugzilla.suse.com/1097624"
},
{
"category": "self",
"summary": "SUSE Bug 1098592",
"url": "https://bugzilla.suse.com/1098592"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0732 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0732/"
}
],
"title": "Security update for openssl",
"tracking": {
"current_release_date": "2018-08-06T07:58:35Z",
"generator": {
"date": "2018-08-06T07:58:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2207-1",
"initial_release_date": "2018-08-06T07:58:35Z",
"revision_history": [
{
"date": "2018-08-06T07:58:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-0.9.8j-0.106.12.1.i586",
"product": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.i586",
"product_id": "libopenssl-devel-0.9.8j-0.106.12.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"product": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"product_id": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"product": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-0.9.8j-0.106.12.1.i586",
"product": {
"name": "openssl-0.9.8j-0.106.12.1.i586",
"product_id": "openssl-0.9.8j-0.106.12.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-doc-0.9.8j-0.106.12.1.i586",
"product": {
"name": "openssl-doc-0.9.8j-0.106.12.1.i586",
"product_id": "openssl-doc-0.9.8j-0.106.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-0.9.8j-0.106.12.1.ia64",
"product": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.ia64",
"product_id": "libopenssl-devel-0.9.8j-0.106.12.1.ia64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"product": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"product_id": "libopenssl0_9_8-0.9.8j-0.106.12.1.ia64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"product": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"product": {
"name": "libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"product_id": "libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64"
}
},
{
"category": "product_version",
"name": "openssl-0.9.8j-0.106.12.1.ia64",
"product": {
"name": "openssl-0.9.8j-0.106.12.1.ia64",
"product_id": "openssl-0.9.8j-0.106.12.1.ia64"
}
},
{
"category": "product_version",
"name": "openssl-doc-0.9.8j-0.106.12.1.ia64",
"product": {
"name": "openssl-doc-0.9.8j-0.106.12.1.ia64",
"product_id": "openssl-doc-0.9.8j-0.106.12.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-0.9.8j-0.106.12.1.ppc64",
"product": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.ppc64",
"product_id": "libopenssl-devel-0.9.8j-0.106.12.1.ppc64"
}
},
{
"category": "product_version",
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64",
"product": {
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64",
"product_id": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"product": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"product_id": "libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"product": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"product_id": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"product": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"product": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64"
}
},
{
"category": "product_version",
"name": "openssl-0.9.8j-0.106.12.1.ppc64",
"product": {
"name": "openssl-0.9.8j-0.106.12.1.ppc64",
"product_id": "openssl-0.9.8j-0.106.12.1.ppc64"
}
},
{
"category": "product_version",
"name": "openssl-doc-0.9.8j-0.106.12.1.ppc64",
"product": {
"name": "openssl-doc-0.9.8j-0.106.12.1.ppc64",
"product_id": "openssl-doc-0.9.8j-0.106.12.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"product": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"product_id": "libopenssl-devel-0.9.8j-0.106.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x",
"product": {
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x",
"product_id": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"product": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"product_id": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"product": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"product_id": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"product": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"product": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-0.9.8j-0.106.12.1.s390x",
"product": {
"name": "openssl-0.9.8j-0.106.12.1.s390x",
"product_id": "openssl-0.9.8j-0.106.12.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-doc-0.9.8j-0.106.12.1.s390x",
"product": {
"name": "openssl-doc-0.9.8j-0.106.12.1.s390x",
"product_id": "openssl-doc-0.9.8j-0.106.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"product": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"product_id": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64",
"product": {
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64",
"product_id": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"product": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"product_id": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"product": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"product_id": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"product": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"product": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-0.9.8j-0.106.12.1.x86_64",
"product": {
"name": "openssl-0.9.8j-0.106.12.1.x86_64",
"product_id": "openssl-0.9.8j-0.106.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-doc-0.9.8j-0.106.12.1.x86_64",
"product": {
"name": "openssl-doc-0.9.8j-0.106.12.1.x86_64",
"product_id": "openssl-doc-0.9.8j-0.106.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Studio Onsite 1.3",
"product": {
"name": "SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-studioonsite:1.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "openssl-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.i586"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ia64"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ppc64"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.s390x"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-0.9.8j-0.106.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "openssl-doc-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64 as component of SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.12.1.x86_64"
},
"product_reference": "libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"relates_to_product_reference": "SUSE Studio Onsite 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0732"
}
],
"notes": [
{
"category": "general",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0732",
"url": "https://www.suse.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "SUSE Bug 1077628 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1077628"
},
{
"category": "external",
"summary": "SUSE Bug 1097158 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "external",
"summary": "SUSE Bug 1099502 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1099502"
},
{
"category": "external",
"summary": "SUSE Bug 1106692 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1106692"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1110163 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1110163"
},
{
"category": "external",
"summary": "SUSE Bug 1112097 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1112097"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1122198"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.12.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.12.1.x86_64",
"SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-06T07:58:35Z",
"details": "important"
}
],
"title": "CVE-2018-0732"
}
]
}
SUSE-SU-2019:1553-1
Vulnerability from csaf_suse - Published: 2019-06-18 16:29 - Updated: 2019-06-18 16:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThis update for openssl fixes the following issues:\n\n- CVE-2018-0732: Reject excessively large primes in DH key generation (bsc#1097158)\n- CVE-2018-0734: Timing vulnerability in DSA signature generation (bsc#1113652)\n- CVE-2018-0737: Cache timing vulnerability in RSA Key Generation (bsc#1089039)\n- CVE-2018-5407: Elliptic curve scalar multiplication timing attack defenses (fixes \u0027PortSmash\u0027) (bsc#1113534)\n- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)\n- Fix One\u0026Done side-channel attack on RSA (bsc#1104789)\n- Reject invalid EC point coordinates (bsc#1131291)\n- The 9 Lives of Bleichenbacher\u0027s CAT: Cache ATtacks on TLS Implementations (bsc#1117951)\n- Add missing error string to CVE-2016-8610 fix (bsc#1110018#c9)\n- blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)\n\nNon security fixes:\n\n- correct the error detection in the fips patch (bsc#1106197)\n- Add openssl(cli) Provide so the packages that require the openssl\n binary can require this instead of the new openssl meta package\n (bsc#1101470)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1553,SUSE-SLE-SERVER-12-2019-1553",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1553-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1553-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191553-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1553-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html"
},
{
"category": "self",
"summary": "SUSE Bug 1089039",
"url": "https://bugzilla.suse.com/1089039"
},
{
"category": "self",
"summary": "SUSE Bug 1097158",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "self",
"summary": "SUSE Bug 1097624",
"url": "https://bugzilla.suse.com/1097624"
},
{
"category": "self",
"summary": "SUSE Bug 1098592",
"url": "https://bugzilla.suse.com/1098592"
},
{
"category": "self",
"summary": "SUSE Bug 1101470",
"url": "https://bugzilla.suse.com/1101470"
},
{
"category": "self",
"summary": "SUSE Bug 1104789",
"url": "https://bugzilla.suse.com/1104789"
},
{
"category": "self",
"summary": "SUSE Bug 1106197",
"url": "https://bugzilla.suse.com/1106197"
},
{
"category": "self",
"summary": "SUSE Bug 1110018",
"url": "https://bugzilla.suse.com/1110018"
},
{
"category": "self",
"summary": "SUSE Bug 1113534",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "self",
"summary": "SUSE Bug 1113652",
"url": "https://bugzilla.suse.com/1113652"
},
{
"category": "self",
"summary": "SUSE Bug 1117951",
"url": "https://bugzilla.suse.com/1117951"
},
{
"category": "self",
"summary": "SUSE Bug 1127080",
"url": "https://bugzilla.suse.com/1127080"
},
{
"category": "self",
"summary": "SUSE Bug 1131291",
"url": "https://bugzilla.suse.com/1131291"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8610 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0732 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0734 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0737 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5407 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1559 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1559/"
}
],
"title": "Security update for openssl",
"tracking": {
"current_release_date": "2019-06-18T16:29:26Z",
"generator": {
"date": "2019-06-18T16:29:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1553-1",
"initial_release_date": "2019-06-18T16:29:26Z",
"revision_history": [
{
"date": "2019-06-18T16:29:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-1.0.1i-27.34.1.aarch64",
"product": {
"name": "libopenssl-devel-1.0.1i-27.34.1.aarch64",
"product_id": "libopenssl-devel-1.0.1i-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-27.34.1.aarch64",
"product": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.aarch64",
"product_id": "libopenssl1_0_0-1.0.1i-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.aarch64",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.aarch64",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-27.34.1.aarch64",
"product": {
"name": "openssl-1.0.1i-27.34.1.aarch64",
"product_id": "openssl-1.0.1i-27.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-64bit-1.0.1i-27.34.1.aarch64_ilp32",
"product": {
"name": "libopenssl-devel-64bit-1.0.1i-27.34.1.aarch64_ilp32",
"product_id": "libopenssl-devel-64bit-1.0.1i-27.34.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-64bit-1.0.1i-27.34.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_0_0-64bit-1.0.1i-27.34.1.aarch64_ilp32",
"product_id": "libopenssl1_0_0-64bit-1.0.1i-27.34.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-64bit-1.0.1i-27.34.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_0_0-hmac-64bit-1.0.1i-27.34.1.aarch64_ilp32",
"product_id": "libopenssl1_0_0-hmac-64bit-1.0.1i-27.34.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-1.0.1i-27.34.1.i586",
"product": {
"name": "libopenssl-devel-1.0.1i-27.34.1.i586",
"product_id": "libopenssl-devel-1.0.1i-27.34.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-27.34.1.i586",
"product": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.i586",
"product_id": "libopenssl1_0_0-1.0.1i-27.34.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.i586",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.i586",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-27.34.1.i586",
"product": {
"name": "openssl-1.0.1i-27.34.1.i586",
"product_id": "openssl-1.0.1i-27.34.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-doc-1.0.1i-27.34.1.noarch",
"product": {
"name": "openssl-doc-1.0.1i-27.34.1.noarch",
"product_id": "openssl-doc-1.0.1i-27.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-1.0.1i-27.34.1.ppc64le",
"product": {
"name": "libopenssl-devel-1.0.1i-27.34.1.ppc64le",
"product_id": "libopenssl-devel-1.0.1i-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"product_id": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-27.34.1.ppc64le",
"product": {
"name": "openssl-1.0.1i-27.34.1.ppc64le",
"product_id": "openssl-1.0.1i-27.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-1.0.1i-27.34.1.s390",
"product": {
"name": "libopenssl-devel-1.0.1i-27.34.1.s390",
"product_id": "libopenssl-devel-1.0.1i-27.34.1.s390"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-27.34.1.s390",
"product": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.s390",
"product_id": "libopenssl1_0_0-1.0.1i-27.34.1.s390"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-27.34.1.s390",
"product": {
"name": "openssl-1.0.1i-27.34.1.s390",
"product_id": "openssl-1.0.1i-27.34.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-1.0.1i-27.34.1.s390x",
"product": {
"name": "libopenssl-devel-1.0.1i-27.34.1.s390x",
"product_id": "libopenssl-devel-1.0.1i-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-devel-32bit-1.0.1i-27.34.1.s390x",
"product": {
"name": "libopenssl-devel-32bit-1.0.1i-27.34.1.s390x",
"product_id": "libopenssl-devel-32bit-1.0.1i-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"product": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"product_id": "libopenssl1_0_0-1.0.1i-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"product_id": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"product": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-27.34.1.s390x",
"product": {
"name": "openssl-1.0.1i-27.34.1.s390x",
"product_id": "openssl-1.0.1i-27.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-devel-1.0.1i-27.34.1.x86_64",
"product": {
"name": "libopenssl-devel-1.0.1i-27.34.1.x86_64",
"product_id": "libopenssl-devel-1.0.1i-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-devel-32bit-1.0.1i-27.34.1.x86_64",
"product": {
"name": "libopenssl-devel-32bit-1.0.1i-27.34.1.x86_64",
"product_id": "libopenssl-devel-32bit-1.0.1i-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"product": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"product_id": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"product_id": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"product": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-27.34.1.x86_64",
"product": {
"name": "openssl-1.0.1i-27.34.1.x86_64",
"product_id": "openssl-1.0.1i-27.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1.0.1i-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le"
},
"product_reference": "openssl-1.0.1i-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x"
},
"product_reference": "openssl-1.0.1i-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64"
},
"product_reference": "openssl-1.0.1i-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-1.0.1i-27.34.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
},
"product_reference": "openssl-doc-1.0.1i-27.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-8610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8610"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8610",
"url": "https://www.suse.com/security/cve/CVE-2016-8610"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1005879 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1005879"
},
{
"category": "external",
"summary": "SUSE Bug 1110018 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1110018"
},
{
"category": "external",
"summary": "SUSE Bug 1120592 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1120592"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1148697"
},
{
"category": "external",
"summary": "SUSE Bug 982575 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/982575"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:29:26Z",
"details": "important"
}
],
"title": "CVE-2016-8610"
},
{
"cve": "CVE-2018-0732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0732"
}
],
"notes": [
{
"category": "general",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0732",
"url": "https://www.suse.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "SUSE Bug 1077628 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1077628"
},
{
"category": "external",
"summary": "SUSE Bug 1097158 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "external",
"summary": "SUSE Bug 1099502 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1099502"
},
{
"category": "external",
"summary": "SUSE Bug 1106692 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1106692"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1110163 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1110163"
},
{
"category": "external",
"summary": "SUSE Bug 1112097 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1112097"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1122198"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:29:26Z",
"details": "important"
}
],
"title": "CVE-2018-0732"
},
{
"cve": "CVE-2018-0734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0734"
}
],
"notes": [
{
"category": "general",
"text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0734",
"url": "https://www.suse.com/security/cve/CVE-2018-0734"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-0734",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1113652 for CVE-2018-0734",
"url": "https://bugzilla.suse.com/1113652"
},
{
"category": "external",
"summary": "SUSE Bug 1113742 for CVE-2018-0734",
"url": "https://bugzilla.suse.com/1113742"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2018-0734",
"url": "https://bugzilla.suse.com/1122198"
},
{
"category": "external",
"summary": "SUSE Bug 1122212 for CVE-2018-0734",
"url": "https://bugzilla.suse.com/1122212"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-0734",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-0734",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:29:26Z",
"details": "moderate"
}
],
"title": "CVE-2018-0734"
},
{
"cve": "CVE-2018-0737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0737"
}
],
"notes": [
{
"category": "general",
"text": "The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0737",
"url": "https://www.suse.com/security/cve/CVE-2018-0737"
},
{
"category": "external",
"summary": "SUSE Bug 1089039 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1089039"
},
{
"category": "external",
"summary": "SUSE Bug 1089041 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1089041"
},
{
"category": "external",
"summary": "SUSE Bug 1089044 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1089044"
},
{
"category": "external",
"summary": "SUSE Bug 1089045 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1089045"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1123780 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1123780"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:29:26Z",
"details": "moderate"
}
],
"title": "CVE-2018-0737"
},
{
"cve": "CVE-2018-5407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5407"
}
],
"notes": [
{
"category": "general",
"text": "Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on \u0027port contention\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5407",
"url": "https://www.suse.com/security/cve/CVE-2018-5407"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-5407",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1116195 for CVE-2018-5407",
"url": "https://bugzilla.suse.com/1116195"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-5407",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-5407",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:29:26Z",
"details": "moderate"
}
],
"title": "CVE-2018-5407"
},
{
"cve": "CVE-2019-1559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1559"
}
],
"notes": [
{
"category": "general",
"text": "If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1559",
"url": "https://www.suse.com/security/cve/CVE-2019-1559"
},
{
"category": "external",
"summary": "SUSE Bug 1127080 for CVE-2019-1559",
"url": "https://bugzilla.suse.com/1127080"
},
{
"category": "external",
"summary": "SUSE Bug 1130039 for CVE-2019-1559",
"url": "https://bugzilla.suse.com/1130039"
},
{
"category": "external",
"summary": "SUSE Bug 1141798 for CVE-2019-1559",
"url": "https://bugzilla.suse.com/1141798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:29:26Z",
"details": "low"
}
],
"title": "CVE-2019-1559"
}
]
}
SUSE-SU-2018:1968-1
Vulnerability from csaf_suse - Published: 2018-07-16 06:27 - Updated: 2018-07-16 06:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl fixes the following issues:\n\n- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based\n ciphersuite a malicious server could have sent a very large prime value to the\n client. This caused the client to spend an unreasonably long period of time\n generating a key for this prime resulting in a hang until the client has\n finished. This could be exploited in a Denial Of Service attack (bsc#1097158).\n- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-1325,SUSE-SLE-SERVER-12-SP1-2018-1325",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1968-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1968-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181968-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1968-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004276.html"
},
{
"category": "self",
"summary": "SUSE Bug 1097158",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "self",
"summary": "SUSE Bug 1097624",
"url": "https://bugzilla.suse.com/1097624"
},
{
"category": "self",
"summary": "SUSE Bug 1098592",
"url": "https://bugzilla.suse.com/1098592"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0732 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0732/"
}
],
"title": "Security update for openssl",
"tracking": {
"current_release_date": "2018-07-16T06:27:28Z",
"generator": {
"date": "2018-07-16T06:27:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1968-1",
"initial_release_date": "2018-07-16T06:27:28Z",
"revision_history": [
{
"date": "2018-07-16T06:27:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssl-doc-1.0.1i-54.14.1.noarch",
"product": {
"name": "openssl-doc-1.0.1i-54.14.1.noarch",
"product_id": "openssl-doc-1.0.1i-54.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"product_id": "libopenssl1_0_0-1.0.1i-54.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-54.14.1.ppc64le",
"product": {
"name": "openssl-1.0.1i-54.14.1.ppc64le",
"product_id": "openssl-1.0.1i-54.14.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-54.14.1.s390x",
"product": {
"name": "libopenssl1_0_0-1.0.1i-54.14.1.s390x",
"product_id": "libopenssl1_0_0-1.0.1i-54.14.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x",
"product_id": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x",
"product": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x",
"product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-54.14.1.s390x",
"product": {
"name": "openssl-1.0.1i-54.14.1.s390x",
"product_id": "openssl-1.0.1i-54.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"product": {
"name": "libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"product_id": "libopenssl1_0_0-1.0.1i-54.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"product_id": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"product_id": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"product": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1.0.1i-54.14.1.x86_64",
"product": {
"name": "openssl-1.0.1i-54.14.1.x86_64",
"product_id": "openssl-1.0.1i-54.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1i-54.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.14.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.14.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1.0.1i-54.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.14.1.ppc64le"
},
"product_reference": "openssl-1.0.1i-54.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.14.1.x86_64"
},
"product_reference": "openssl-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-1.0.1i-54.14.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.14.1.noarch"
},
"product_reference": "openssl-doc-1.0.1i-54.14.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1i-54.14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1i-54.14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.1i-54.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1.0.1i-54.14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.ppc64le"
},
"product_reference": "openssl-1.0.1i-54.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1.0.1i-54.14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.s390x"
},
"product_reference": "openssl-1.0.1i-54.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1.0.1i-54.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.x86_64"
},
"product_reference": "openssl-1.0.1i-54.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-doc-1.0.1i-54.14.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.14.1.noarch"
},
"product_reference": "openssl-doc-1.0.1i-54.14.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0732"
}
],
"notes": [
{
"category": "general",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.14.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0732",
"url": "https://www.suse.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "SUSE Bug 1077628 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1077628"
},
{
"category": "external",
"summary": "SUSE Bug 1097158 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "external",
"summary": "SUSE Bug 1099502 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1099502"
},
{
"category": "external",
"summary": "SUSE Bug 1106692 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1106692"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1110163 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1110163"
},
{
"category": "external",
"summary": "SUSE Bug 1112097 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1112097"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1122198"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.14.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.14.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-16T06:27:28Z",
"details": "important"
}
],
"title": "CVE-2018-0732"
}
]
}
SUSE-SU-2018:2534-1
Vulnerability from csaf_suse - Published: 2018-08-28 09:05 - Updated: 2018-08-28 09:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for compat-openssl097g",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for compat-openssl097g fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based\n ciphersuite a malicious server could have sent a very large prime value to the\n client. This caused the client to spend an unreasonably long period of time\n generating a key for this prime resulting in a hang until the client has\n finished. This could be exploited in a Denial Of Service attack (bsc#1097158)\n- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as\n can be found in PKCS7) could eventually exceed the stack given malicious input\n with excessive recursion. This could have resulted in DoS (bsc#1087102)\n\nThis non-security issue was fixed:\n\n- Fixed crash in DES_fcrypt (bsc#1065363)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slesappsp4-compat-openssl097g-13753",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2534-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2534-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2534-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065363",
"url": "https://bugzilla.suse.com/1065363"
},
{
"category": "self",
"summary": "SUSE Bug 1087102",
"url": "https://bugzilla.suse.com/1087102"
},
{
"category": "self",
"summary": "SUSE Bug 1097158",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0732 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0739 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0739/"
}
],
"title": "Security update for compat-openssl097g",
"tracking": {
"current_release_date": "2018-08-28T09:05:06Z",
"generator": {
"date": "2018-08-28T09:05:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2534-1",
"initial_release_date": "2018-08-28T09:05:06Z",
"revision_history": [
{
"date": "2018-08-28T09:05:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"product": {
"name": "compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"product_id": "compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64"
}
},
{
"category": "product_version",
"name": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"product": {
"name": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"product_id": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"product": {
"name": "compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"product_id": "compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64",
"product": {
"name": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64",
"product_id": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64"
},
"product_reference": "compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64"
},
"product_reference": "compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64"
},
"product_reference": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64"
},
"product_reference": "compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0732"
}
],
"notes": [
{
"category": "general",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0732",
"url": "https://www.suse.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "SUSE Bug 1077628 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1077628"
},
{
"category": "external",
"summary": "SUSE Bug 1097158 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "external",
"summary": "SUSE Bug 1099502 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1099502"
},
{
"category": "external",
"summary": "SUSE Bug 1106692 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1106692"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1110163 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1110163"
},
{
"category": "external",
"summary": "SUSE Bug 1112097 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1112097"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1122198"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-28T09:05:06Z",
"details": "important"
}
],
"title": "CVE-2018-0732"
},
{
"cve": "CVE-2018-0739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0739"
}
],
"notes": [
{
"category": "general",
"text": "Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0739",
"url": "https://www.suse.com/security/cve/CVE-2018-0739"
},
{
"category": "external",
"summary": "SUSE Bug 1087102 for CVE-2018-0739",
"url": "https://bugzilla.suse.com/1087102"
},
{
"category": "external",
"summary": "SUSE Bug 1089997 for CVE-2018-0739",
"url": "https://bugzilla.suse.com/1089997"
},
{
"category": "external",
"summary": "SUSE Bug 1094291 for CVE-2018-0739",
"url": "https://bugzilla.suse.com/1094291"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0739",
"url": "https://bugzilla.suse.com/1108542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-28T09:05:06Z",
"details": "important"
}
],
"title": "CVE-2018-0739"
}
]
}
SUSE-SU-2018:2683-1
Vulnerability from csaf_suse - Published: 2018-09-10 16:00 - Updated: 2018-09-10 16:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for compat-openssl098",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for compat-openssl098 fixes the following security issues:\n\n- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based\n ciphersuite a malicious server could have sent a very large prime value to the\n client. This caused the client to spend an unreasonably long period of time\n generating a key for this prime resulting in a hang until the client has\n finished. This could be exploited in a Denial Of Service attack (bsc#1097158)\n- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)\n- CVE-2018-0737: The RSA Key generation algorithm has been shown to be\n vulnerable to a cache timing side channel attack. An attacker with sufficient\n access to mount cache timing attacks during the RSA key generation process\n could have recovered the private key (bsc#1089039)\n- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as\n can be found in PKCS7) could eventually exceed the stack given malicious input\n with excessive recursion. This could have resulted in DoS (bsc#1087102).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-1872,SUSE-SLE-Module-Legacy-12-2018-1872,SUSE-SLE-SAP-12-SP1-2018-1872,SUSE-SLE-SAP-12-SP2-2018-1872,SUSE-SLE-SAP-12-SP3-2018-1872",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2683-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2683-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182683-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2683-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087102",
"url": "https://bugzilla.suse.com/1087102"
},
{
"category": "self",
"summary": "SUSE Bug 1089039",
"url": "https://bugzilla.suse.com/1089039"
},
{
"category": "self",
"summary": "SUSE Bug 1097158",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "self",
"summary": "SUSE Bug 1097624",
"url": "https://bugzilla.suse.com/1097624"
},
{
"category": "self",
"summary": "SUSE Bug 1098592",
"url": "https://bugzilla.suse.com/1098592"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0732 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0737 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0739 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0739/"
}
],
"title": "Security update for compat-openssl098",
"tracking": {
"current_release_date": "2018-09-10T16:00:03Z",
"generator": {
"date": "2018-09-10T16:00:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2683-1",
"initial_release_date": "2018-09-10T16:00:03Z",
"revision_history": [
{
"date": "2018-09-10T16:00:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"product": {
"name": "libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"product_id": "libopenssl0_9_8-0.9.8j-106.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"product": {
"name": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"product_id": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"product": {
"name": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"product_id": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"product": {
"name": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"product_id": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 12",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 12",
"product_id": "SUSE Linux Enterprise Module for Legacy 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-106.6.1.s390x as component of SUSE Linux Enterprise Module for Legacy 12",
"product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x"
},
"product_reference": "libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 12",
"product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x as component of SUSE Linux Enterprise Module for Legacy 12",
"product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 12",
"product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64"
},
"product_reference": "libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
},
"product_reference": "libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0732"
}
],
"notes": [
{
"category": "general",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0732",
"url": "https://www.suse.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "SUSE Bug 1077628 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1077628"
},
{
"category": "external",
"summary": "SUSE Bug 1097158 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "external",
"summary": "SUSE Bug 1099502 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1099502"
},
{
"category": "external",
"summary": "SUSE Bug 1106692 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1106692"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1110163 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1110163"
},
{
"category": "external",
"summary": "SUSE Bug 1112097 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1112097"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1122198"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-10T16:00:03Z",
"details": "important"
}
],
"title": "CVE-2018-0732"
},
{
"cve": "CVE-2018-0737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0737"
}
],
"notes": [
{
"category": "general",
"text": "The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0737",
"url": "https://www.suse.com/security/cve/CVE-2018-0737"
},
{
"category": "external",
"summary": "SUSE Bug 1089039 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1089039"
},
{
"category": "external",
"summary": "SUSE Bug 1089041 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1089041"
},
{
"category": "external",
"summary": "SUSE Bug 1089044 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1089044"
},
{
"category": "external",
"summary": "SUSE Bug 1089045 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1089045"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1123780 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1123780"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-0737",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-10T16:00:03Z",
"details": "moderate"
}
],
"title": "CVE-2018-0737"
},
{
"cve": "CVE-2018-0739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0739"
}
],
"notes": [
{
"category": "general",
"text": "Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0739",
"url": "https://www.suse.com/security/cve/CVE-2018-0739"
},
{
"category": "external",
"summary": "SUSE Bug 1087102 for CVE-2018-0739",
"url": "https://bugzilla.suse.com/1087102"
},
{
"category": "external",
"summary": "SUSE Bug 1089997 for CVE-2018-0739",
"url": "https://bugzilla.suse.com/1089997"
},
{
"category": "external",
"summary": "SUSE Bug 1094291 for CVE-2018-0739",
"url": "https://bugzilla.suse.com/1094291"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0739",
"url": "https://bugzilla.suse.com/1108542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-10T16:00:03Z",
"details": "important"
}
],
"title": "CVE-2018-0739"
}
]
}
SUSE-SU-2018:2036-1
Vulnerability from csaf_suse - Published: 2018-07-23 08:40 - Updated: 2018-07-23 08:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based\n ciphersuite a malicious server could have sent a very large prime value to the\n client. This caused the client to spend an unreasonably long period of time\n generating a key for this prime resulting in a hang until the client has\n finished. This could be exploited in a Denial Of Service attack (bsc#1097158).\n- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Basesystem-15-2018-1372",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2036-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2036-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182036-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2036-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004293.html"
},
{
"category": "self",
"summary": "SUSE Bug 1097158",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "self",
"summary": "SUSE Bug 1097624",
"url": "https://bugzilla.suse.com/1097624"
},
{
"category": "self",
"summary": "SUSE Bug 1098592",
"url": "https://bugzilla.suse.com/1098592"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0732 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0732/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2018-07-23T08:40:32Z",
"generator": {
"date": "2018-07-23T08:40:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2036-1",
"initial_release_date": "2018-07-23T08:40:32Z",
"revision_history": [
{
"date": "2018-07-23T08:40:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.0h-4.3.1.aarch64",
"product": {
"name": "libopenssl1_1-1.1.0h-4.3.1.aarch64",
"product_id": "libopenssl1_1-1.1.0h-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64",
"product": {
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64",
"product_id": "libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.0h-4.3.1.aarch64",
"product": {
"name": "openssl-1_1-1.1.0h-4.3.1.aarch64",
"product_id": "openssl-1_1-1.1.0h-4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.0h-4.3.1.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.0h-4.3.1.ppc64le",
"product_id": "libopenssl1_1-1.1.0h-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le",
"product": {
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le",
"product_id": "libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.0h-4.3.1.ppc64le",
"product": {
"name": "openssl-1_1-1.1.0h-4.3.1.ppc64le",
"product_id": "openssl-1_1-1.1.0h-4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.s390x",
"product_id": "libopenssl-1_1-devel-1.1.0h-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.0h-4.3.1.s390x",
"product": {
"name": "libopenssl1_1-1.1.0h-4.3.1.s390x",
"product_id": "libopenssl1_1-1.1.0h-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.s390x",
"product": {
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.s390x",
"product_id": "libopenssl1_1-hmac-1.1.0h-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.0h-4.3.1.s390x",
"product": {
"name": "openssl-1_1-1.1.0h-4.3.1.s390x",
"product_id": "openssl-1_1-1.1.0h-4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.0h-4.3.1.x86_64",
"product": {
"name": "libopenssl1_1-1.1.0h-4.3.1.x86_64",
"product_id": "libopenssl1_1-1.1.0h-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64",
"product_id": "libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64",
"product_id": "libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.0h-4.3.1.x86_64",
"product": {
"name": "openssl-1_1-1.1.0h-4.3.1.x86_64",
"product_id": "openssl-1_1-1.1.0h-4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.0h-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.0h-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.0h-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.0h-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.0h-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.0h-4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.0h-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.0h-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.0h-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.0h-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.0h-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.0h-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.0h-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.0h-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.0h-4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.s390x"
},
"product_reference": "openssl-1_1-1.1.0h-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.0h-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.0h-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0732"
}
],
"notes": [
{
"category": "general",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0732",
"url": "https://www.suse.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "SUSE Bug 1077628 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1077628"
},
{
"category": "external",
"summary": "SUSE Bug 1097158 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "external",
"summary": "SUSE Bug 1099502 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1099502"
},
{
"category": "external",
"summary": "SUSE Bug 1106692 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1106692"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1110163 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1110163"
},
{
"category": "external",
"summary": "SUSE Bug 1112097 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1112097"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1122198"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-32bit-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-32bit-1.1.0h-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0h-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-23T08:40:32Z",
"details": "important"
}
],
"title": "CVE-2018-0732"
}
]
}
SUSE-SU-2019:14246-1
Vulnerability from csaf_suse - Published: 2020-01-17 17:07 - Updated: 2020-01-17 17:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Mozilla Firefox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update contains the Mozilla Firefox ESR 68.2 release.\n\nMozilla Firefox was updated to ESR 68.2 release:\n\n* Enterprise: New administrative policies were added. More\n information and templates are available at the Policy\n Templates page.\n\n* Various security fixes:\n MFSA 2019-33 (bsc#1154738)\n * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber\n * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB\n * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security\n * CVE-2019-11759: Stack buffer overflow in HKDF output\n * CVE-2019-11760: Stack buffer overflow in WebRTC networking\n * CVE-2019-11761: Unintended access to a privileged JSONView object\n * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation\n * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique\n * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2\n\nOther Issues resolved:\n\n* [bsc#1104841] Newer versions of firefox have a dependency on\n GLIBCXX_3.4.20\n* [bsc#1074235] MozillaFirefox: background tab crash reports sent\n inadvertently without user opt-in\n* [bsc#1043008] Firefox hangs randomly when browsing and\n scrolling\n* [bsc#1025108] Firefox stops loading page until mouse is moved\n* [bsc#905528] Firefox malfunctions due to broken omni.ja\n archives\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-firefox-201910-14246",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14246-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:14246-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:14246-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html"
},
{
"category": "self",
"summary": "SUSE Bug 1000036",
"url": "https://bugzilla.suse.com/1000036"
},
{
"category": "self",
"summary": "SUSE Bug 1001652",
"url": "https://bugzilla.suse.com/1001652"
},
{
"category": "self",
"summary": "SUSE Bug 1025108",
"url": "https://bugzilla.suse.com/1025108"
},
{
"category": "self",
"summary": "SUSE Bug 1029377",
"url": "https://bugzilla.suse.com/1029377"
},
{
"category": "self",
"summary": "SUSE Bug 1029902",
"url": "https://bugzilla.suse.com/1029902"
},
{
"category": "self",
"summary": "SUSE Bug 1040164",
"url": "https://bugzilla.suse.com/1040164"
},
{
"category": "self",
"summary": "SUSE Bug 104105",
"url": "https://bugzilla.suse.com/104105"
},
{
"category": "self",
"summary": "SUSE Bug 1042670",
"url": "https://bugzilla.suse.com/1042670"
},
{
"category": "self",
"summary": "SUSE Bug 1043008",
"url": "https://bugzilla.suse.com/1043008"
},
{
"category": "self",
"summary": "SUSE Bug 1044946",
"url": "https://bugzilla.suse.com/1044946"
},
{
"category": "self",
"summary": "SUSE Bug 1047925",
"url": "https://bugzilla.suse.com/1047925"
},
{
"category": "self",
"summary": "SUSE Bug 1047936",
"url": "https://bugzilla.suse.com/1047936"
},
{
"category": "self",
"summary": "SUSE Bug 1048299",
"url": "https://bugzilla.suse.com/1048299"
},
{
"category": "self",
"summary": "SUSE Bug 1049186",
"url": "https://bugzilla.suse.com/1049186"
},
{
"category": "self",
"summary": "SUSE Bug 1050653",
"url": "https://bugzilla.suse.com/1050653"
},
{
"category": "self",
"summary": "SUSE Bug 1056058",
"url": "https://bugzilla.suse.com/1056058"
},
{
"category": "self",
"summary": "SUSE Bug 1058013",
"url": "https://bugzilla.suse.com/1058013"
},
{
"category": "self",
"summary": "SUSE Bug 1066242",
"url": "https://bugzilla.suse.com/1066242"
},
{
"category": "self",
"summary": "SUSE Bug 1066953",
"url": "https://bugzilla.suse.com/1066953"
},
{
"category": "self",
"summary": "SUSE Bug 1070738",
"url": "https://bugzilla.suse.com/1070738"
},
{
"category": "self",
"summary": "SUSE Bug 1070853",
"url": "https://bugzilla.suse.com/1070853"
},
{
"category": "self",
"summary": "SUSE Bug 1072320",
"url": "https://bugzilla.suse.com/1072320"
},
{
"category": "self",
"summary": "SUSE Bug 1072322",
"url": "https://bugzilla.suse.com/1072322"
},
{
"category": "self",
"summary": "SUSE Bug 1073796",
"url": "https://bugzilla.suse.com/1073796"
},
{
"category": "self",
"summary": "SUSE Bug 1073798",
"url": "https://bugzilla.suse.com/1073798"
},
{
"category": "self",
"summary": "SUSE Bug 1073799",
"url": "https://bugzilla.suse.com/1073799"
},
{
"category": "self",
"summary": "SUSE Bug 1073803",
"url": "https://bugzilla.suse.com/1073803"
},
{
"category": "self",
"summary": "SUSE Bug 1073808",
"url": "https://bugzilla.suse.com/1073808"
},
{
"category": "self",
"summary": "SUSE Bug 1073818",
"url": "https://bugzilla.suse.com/1073818"
},
{
"category": "self",
"summary": "SUSE Bug 1073823",
"url": "https://bugzilla.suse.com/1073823"
},
{
"category": "self",
"summary": "SUSE Bug 1073829",
"url": "https://bugzilla.suse.com/1073829"
},
{
"category": "self",
"summary": "SUSE Bug 1073830",
"url": "https://bugzilla.suse.com/1073830"
},
{
"category": "self",
"summary": "SUSE Bug 1073832",
"url": "https://bugzilla.suse.com/1073832"
},
{
"category": "self",
"summary": "SUSE Bug 1073846",
"url": "https://bugzilla.suse.com/1073846"
},
{
"category": "self",
"summary": "SUSE Bug 1074235",
"url": "https://bugzilla.suse.com/1074235"
},
{
"category": "self",
"summary": "SUSE Bug 1077230",
"url": "https://bugzilla.suse.com/1077230"
},
{
"category": "self",
"summary": "SUSE Bug 1079761",
"url": "https://bugzilla.suse.com/1079761"
},
{
"category": "self",
"summary": "SUSE Bug 1081750",
"url": "https://bugzilla.suse.com/1081750"
},
{
"category": "self",
"summary": "SUSE Bug 1082318",
"url": "https://bugzilla.suse.com/1082318"
},
{
"category": "self",
"summary": "SUSE Bug 1087453",
"url": "https://bugzilla.suse.com/1087453"
},
{
"category": "self",
"summary": "SUSE Bug 1087459",
"url": "https://bugzilla.suse.com/1087459"
},
{
"category": "self",
"summary": "SUSE Bug 1087463",
"url": "https://bugzilla.suse.com/1087463"
},
{
"category": "self",
"summary": "SUSE Bug 1088573",
"url": "https://bugzilla.suse.com/1088573"
},
{
"category": "self",
"summary": "SUSE Bug 1091764",
"url": "https://bugzilla.suse.com/1091764"
},
{
"category": "self",
"summary": "SUSE Bug 1094814",
"url": "https://bugzilla.suse.com/1094814"
},
{
"category": "self",
"summary": "SUSE Bug 1097158",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "self",
"summary": "SUSE Bug 1097375",
"url": "https://bugzilla.suse.com/1097375"
},
{
"category": "self",
"summary": "SUSE Bug 1097401",
"url": "https://bugzilla.suse.com/1097401"
},
{
"category": "self",
"summary": "SUSE Bug 1097404",
"url": "https://bugzilla.suse.com/1097404"
},
{
"category": "self",
"summary": "SUSE Bug 1097748",
"url": "https://bugzilla.suse.com/1097748"
},
{
"category": "self",
"summary": "SUSE Bug 1104841",
"url": "https://bugzilla.suse.com/1104841"
},
{
"category": "self",
"summary": "SUSE Bug 1105019",
"url": "https://bugzilla.suse.com/1105019"
},
{
"category": "self",
"summary": "SUSE Bug 1107030",
"url": "https://bugzilla.suse.com/1107030"
},
{
"category": "self",
"summary": "SUSE Bug 1109465",
"url": "https://bugzilla.suse.com/1109465"
},
{
"category": "self",
"summary": "SUSE Bug 1117473",
"url": "https://bugzilla.suse.com/1117473"
},
{
"category": "self",
"summary": "SUSE Bug 1117626",
"url": "https://bugzilla.suse.com/1117626"
},
{
"category": "self",
"summary": "SUSE Bug 1117627",
"url": "https://bugzilla.suse.com/1117627"
},
{
"category": "self",
"summary": "SUSE Bug 1117629",
"url": "https://bugzilla.suse.com/1117629"
},
{
"category": "self",
"summary": "SUSE Bug 1117630",
"url": "https://bugzilla.suse.com/1117630"
},
{
"category": "self",
"summary": "SUSE Bug 1120644",
"url": "https://bugzilla.suse.com/1120644"
},
{
"category": "self",
"summary": "SUSE Bug 1122191",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "self",
"summary": "SUSE Bug 1123482",
"url": "https://bugzilla.suse.com/1123482"
},
{
"category": "self",
"summary": "SUSE Bug 1124525",
"url": "https://bugzilla.suse.com/1124525"
},
{
"category": "self",
"summary": "SUSE Bug 1127532",
"url": "https://bugzilla.suse.com/1127532"
},
{
"category": "self",
"summary": "SUSE Bug 1129346",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "self",
"summary": "SUSE Bug 1130694",
"url": "https://bugzilla.suse.com/1130694"
},
{
"category": "self",
"summary": "SUSE Bug 1130840",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "self",
"summary": "SUSE Bug 1133452",
"url": "https://bugzilla.suse.com/1133452"
},
{
"category": "self",
"summary": "SUSE Bug 1133810",
"url": "https://bugzilla.suse.com/1133810"
},
{
"category": "self",
"summary": "SUSE Bug 1134209",
"url": "https://bugzilla.suse.com/1134209"
},
{
"category": "self",
"summary": "SUSE Bug 1138459",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "self",
"summary": "SUSE Bug 1140290",
"url": "https://bugzilla.suse.com/1140290"
},
{
"category": "self",
"summary": "SUSE Bug 1140868",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "self",
"summary": "SUSE Bug 1141853",
"url": "https://bugzilla.suse.com/1141853"
},
{
"category": "self",
"summary": "SUSE Bug 1144919",
"url": "https://bugzilla.suse.com/1144919"
},
{
"category": "self",
"summary": "SUSE Bug 1145665",
"url": "https://bugzilla.suse.com/1145665"
},
{
"category": "self",
"summary": "SUSE Bug 1146090",
"url": "https://bugzilla.suse.com/1146090"
},
{
"category": "self",
"summary": "SUSE Bug 1146091",
"url": "https://bugzilla.suse.com/1146091"
},
{
"category": "self",
"summary": "SUSE Bug 1146093",
"url": "https://bugzilla.suse.com/1146093"
},
{
"category": "self",
"summary": "SUSE Bug 1146094",
"url": "https://bugzilla.suse.com/1146094"
},
{
"category": "self",
"summary": "SUSE Bug 1146095",
"url": "https://bugzilla.suse.com/1146095"
},
{
"category": "self",
"summary": "SUSE Bug 1146097",
"url": "https://bugzilla.suse.com/1146097"
},
{
"category": "self",
"summary": "SUSE Bug 1146099",
"url": "https://bugzilla.suse.com/1146099"
},
{
"category": "self",
"summary": "SUSE Bug 1146100",
"url": "https://bugzilla.suse.com/1146100"
},
{
"category": "self",
"summary": "SUSE Bug 1149323",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "self",
"summary": "SUSE Bug 1153423",
"url": "https://bugzilla.suse.com/1153423"
},
{
"category": "self",
"summary": "SUSE Bug 1154738",
"url": "https://bugzilla.suse.com/1154738"
},
{
"category": "self",
"summary": "SUSE Bug 1447070",
"url": "https://bugzilla.suse.com/1447070"
},
{
"category": "self",
"summary": "SUSE Bug 1447409",
"url": "https://bugzilla.suse.com/1447409"
},
{
"category": "self",
"summary": "SUSE Bug 744625",
"url": "https://bugzilla.suse.com/744625"
},
{
"category": "self",
"summary": "SUSE Bug 744629",
"url": "https://bugzilla.suse.com/744629"
},
{
"category": "self",
"summary": "SUSE Bug 845955",
"url": "https://bugzilla.suse.com/845955"
},
{
"category": "self",
"summary": "SUSE Bug 865853",
"url": "https://bugzilla.suse.com/865853"
},
{
"category": "self",
"summary": "SUSE Bug 905528",
"url": "https://bugzilla.suse.com/905528"
},
{
"category": "self",
"summary": "SUSE Bug 917607",
"url": "https://bugzilla.suse.com/917607"
},
{
"category": "self",
"summary": "SUSE Bug 935856",
"url": "https://bugzilla.suse.com/935856"
},
{
"category": "self",
"summary": "SUSE Bug 937414",
"url": "https://bugzilla.suse.com/937414"
},
{
"category": "self",
"summary": "SUSE Bug 947747",
"url": "https://bugzilla.suse.com/947747"
},
{
"category": "self",
"summary": "SUSE Bug 948045",
"url": "https://bugzilla.suse.com/948045"
},
{
"category": "self",
"summary": "SUSE Bug 948602",
"url": "https://bugzilla.suse.com/948602"
},
{
"category": "self",
"summary": "SUSE Bug 955142",
"url": "https://bugzilla.suse.com/955142"
},
{
"category": "self",
"summary": "SUSE Bug 957814",
"url": "https://bugzilla.suse.com/957814"
},
{
"category": "self",
"summary": "SUSE Bug 957815",
"url": "https://bugzilla.suse.com/957815"
},
{
"category": "self",
"summary": "SUSE Bug 961254",
"url": "https://bugzilla.suse.com/961254"
},
{
"category": "self",
"summary": "SUSE Bug 962297",
"url": "https://bugzilla.suse.com/962297"
},
{
"category": "self",
"summary": "SUSE Bug 966076",
"url": "https://bugzilla.suse.com/966076"
},
{
"category": "self",
"summary": "SUSE Bug 966077",
"url": "https://bugzilla.suse.com/966077"
},
{
"category": "self",
"summary": "SUSE Bug 985201",
"url": "https://bugzilla.suse.com/985201"
},
{
"category": "self",
"summary": "SUSE Bug 986541",
"url": "https://bugzilla.suse.com/986541"
},
{
"category": "self",
"summary": "SUSE Bug 991344",
"url": "https://bugzilla.suse.com/991344"
},
{
"category": "self",
"summary": "SUSE Bug 998743",
"url": "https://bugzilla.suse.com/998743"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2882 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6639 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6640 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6668 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0224 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3193 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3194 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5380 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7384 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2086 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2178 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2216 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5172 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6304 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6306 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7052 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7099 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000381 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10686 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11111 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11499 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14228 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14849 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14919 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15896 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15897 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17810 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17811 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17812 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17813 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17814 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17815 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17816 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17817 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17818 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17819 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17820 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17820/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18207 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3735 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3736 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3738 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0732 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000168 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12115 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12116 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12121 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12122 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12122/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12123 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20406 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20852 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7158 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7159 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7160 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7161 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7167 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10160 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11709 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11710 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11711 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11712 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11713 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11714 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11715 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11716 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11716/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11717 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11718 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11719 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11720 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11721 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11723 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11724 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11725 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11727 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11728 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11729 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11730 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11733 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11735 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11736 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11738 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11740 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11742 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11743 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11744 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11746 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11748 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11749 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11750 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11751 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11751/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11752 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11753 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11757 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11758 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11759 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11760 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11761 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11762 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11763 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11764 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13173 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15903 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5737 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9511 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9512 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9513 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9513/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9514 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9514/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9515 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9515/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9516 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9517 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9518 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9518/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9636 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
}
],
"title": "Security update for Mozilla Firefox",
"tracking": {
"current_release_date": "2020-01-17T17:07:38Z",
"generator": {
"date": "2020-01-17T17:07:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:14246-1",
"initial_release_date": "2020-01-17T17:07:38Z",
"revision_history": [
{
"date": "2020-01-17T17:07:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-68.2.0-78.51.4.x86_64",
"product": {
"name": "MozillaFirefox-68.2.0-78.51.4.x86_64",
"product_id": "MozillaFirefox-68.2.0-78.51.4.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"product": {
"name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"product_id": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"product_id": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"product_id": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-atk-lang-2.26.1-2.8.4.x86_64",
"product": {
"name": "firefox-atk-lang-2.26.1-2.8.4.x86_64",
"product_id": "firefox-atk-lang-2.26.1-2.8.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"product": {
"name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"product_id": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"product": {
"name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"product_id": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"product": {
"name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"product_id": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"product": {
"name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"product_id": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"product": {
"name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"product_id": "firefox-glib2-lang-2.54.3-2.14.7.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"product": {
"name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"product_id": "firefox-glib2-tools-2.54.3-2.14.7.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-data-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"product_id": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"product": {
"name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"product_id": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"product": {
"name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"product_id": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libcairo2-1.15.10-2.13.4.x86_64",
"product": {
"name": "firefox-libcairo2-1.15.10-2.13.4.x86_64",
"product_id": "firefox-libcairo2-1.15.10-2.13.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"product": {
"name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"product_id": "firefox-libffi4-5.3.1+r233831-14.1.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"product": {
"name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"product_id": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"product": {
"name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"product_id": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"product": {
"name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"product_id": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"product": {
"name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"product_id": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64"
}
},
{
"category": "product_version",
"name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"product": {
"name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"product_id": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64"
}
},
{
"category": "product_version",
"name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"product": {
"name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"product_id": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64"
}
},
{
"category": "product_version",
"name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"product": {
"name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"product_id": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64"
}
},
{
"category": "product_version",
"name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"product": {
"name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"product_id": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64"
}
},
{
"category": "product_version",
"name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"product": {
"name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"product_id": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64"
}
},
{
"category": "product_version",
"name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"product": {
"name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"product_id": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64"
}
},
{
"category": "product_version",
"name": "libfreebl3-3.45-38.9.3.x86_64",
"product": {
"name": "libfreebl3-3.45-38.9.3.x86_64",
"product_id": "libfreebl3-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.45-38.9.3.x86_64",
"product": {
"name": "libfreebl3-32bit-3.45-38.9.3.x86_64",
"product_id": "libfreebl3-32bit-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.45-38.9.3.x86_64",
"product": {
"name": "libsoftokn3-3.45-38.9.3.x86_64",
"product_id": "libsoftokn3-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.45-38.9.3.x86_64",
"product": {
"name": "libsoftokn3-32bit-3.45-38.9.3.x86_64",
"product_id": "libsoftokn3-32bit-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nspr-4.21-29.6.1.x86_64",
"product": {
"name": "mozilla-nspr-4.21-29.6.1.x86_64",
"product_id": "mozilla-nspr-4.21-29.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"product": {
"name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"product_id": "mozilla-nspr-32bit-4.21-29.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nspr-devel-4.21-29.6.1.x86_64",
"product": {
"name": "mozilla-nspr-devel-4.21-29.6.1.x86_64",
"product_id": "mozilla-nspr-devel-4.21-29.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.45-38.9.3.x86_64",
"product": {
"name": "mozilla-nss-3.45-38.9.3.x86_64",
"product_id": "mozilla-nss-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.45-38.9.3.x86_64",
"product": {
"name": "mozilla-nss-32bit-3.45-38.9.3.x86_64",
"product_id": "mozilla-nss-32bit-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.45-38.9.3.x86_64",
"product": {
"name": "mozilla-nss-certs-3.45-38.9.3.x86_64",
"product_id": "mozilla-nss-certs-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"product": {
"name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"product_id": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.45-38.9.3.x86_64",
"product": {
"name": "mozilla-nss-devel-3.45-38.9.3.x86_64",
"product_id": "mozilla-nss-devel-3.45-38.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.45-38.9.3.x86_64",
"product": {
"name": "mozilla-nss-tools-3.45-38.9.3.x86_64",
"product_id": "mozilla-nss-tools-3.45-38.9.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64"
},
"product_reference": "MozillaFirefox-68.2.0-78.51.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64"
},
"product_reference": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-atk-lang-2.26.1-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64"
},
"product_reference": "firefox-atk-lang-2.26.1-2.8.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64"
},
"product_reference": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64"
},
"product_reference": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64"
},
"product_reference": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64"
},
"product_reference": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64"
},
"product_reference": "firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64"
},
"product_reference": "firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64"
},
"product_reference": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64"
},
"product_reference": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libcairo2-1.15.10-2.13.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64"
},
"product_reference": "firefox-libcairo2-1.15.10-2.13.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64"
},
"product_reference": "firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64"
},
"product_reference": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64"
},
"product_reference": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64"
},
"product_reference": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64"
},
"product_reference": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64"
},
"product_reference": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64"
},
"product_reference": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64"
},
"product_reference": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64"
},
"product_reference": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64"
},
"product_reference": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64"
},
"product_reference": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64"
},
"product_reference": "libfreebl3-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64"
},
"product_reference": "libfreebl3-32bit-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64"
},
"product_reference": "libsoftokn3-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64"
},
"product_reference": "libsoftokn3-32bit-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nspr-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64"
},
"product_reference": "mozilla-nspr-4.21-29.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64"
},
"product_reference": "mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nspr-devel-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64"
},
"product_reference": "mozilla-nspr-devel-4.21-29.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64"
},
"product_reference": "mozilla-nss-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64"
},
"product_reference": "mozilla-nss-32bit-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64"
},
"product_reference": "mozilla-nss-certs-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64"
},
"product_reference": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64"
},
"product_reference": "mozilla-nss-devel-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
},
"product_reference": "mozilla-nss-tools-3.45-38.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2882"
}
],
"notes": [
{
"category": "general",
"text": "Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2882",
"url": "https://www.suse.com/security/cve/CVE-2013-2882"
},
{
"category": "external",
"summary": "SUSE Bug 833343 for CVE-2013-2882",
"url": "https://bugzilla.suse.com/833343"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2013-2882"
},
{
"cve": "CVE-2013-6639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6639"
}
],
"notes": [
{
"category": "general",
"text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6639",
"url": "https://www.suse.com/security/cve/CVE-2013-6639"
},
{
"category": "external",
"summary": "SUSE Bug 854473 for CVE-2013-6639",
"url": "https://bugzilla.suse.com/854473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2013-6639"
},
{
"cve": "CVE-2013-6640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6640"
}
],
"notes": [
{
"category": "general",
"text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6640",
"url": "https://www.suse.com/security/cve/CVE-2013-6640"
},
{
"category": "external",
"summary": "SUSE Bug 854473 for CVE-2013-6640",
"url": "https://bugzilla.suse.com/854473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2013-6640"
},
{
"cve": "CVE-2013-6668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6668"
}
],
"notes": [
{
"category": "general",
"text": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6668",
"url": "https://www.suse.com/security/cve/CVE-2013-6668"
},
{
"category": "external",
"summary": "SUSE Bug 866959 for CVE-2013-6668",
"url": "https://bugzilla.suse.com/866959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2013-6668"
},
{
"cve": "CVE-2014-0224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0224"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0224",
"url": "https://www.suse.com/security/cve/CVE-2014-0224"
},
{
"category": "external",
"summary": "SUSE Bug 1146657 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/1146657"
},
{
"category": "external",
"summary": "SUSE Bug 880891 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/880891"
},
{
"category": "external",
"summary": "SUSE Bug 881743 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/881743"
},
{
"category": "external",
"summary": "SUSE Bug 883126 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/883126"
},
{
"category": "external",
"summary": "SUSE Bug 885777 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/885777"
},
{
"category": "external",
"summary": "SUSE Bug 892403 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/892403"
},
{
"category": "external",
"summary": "SUSE Bug 901237 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/901237"
},
{
"category": "external",
"summary": "SUSE Bug 903703 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/903703"
},
{
"category": "external",
"summary": "SUSE Bug 905018 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/905018"
},
{
"category": "external",
"summary": "SUSE Bug 905106 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/905106"
},
{
"category": "external",
"summary": "SUSE Bug 914447 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/914447"
},
{
"category": "external",
"summary": "SUSE Bug 915913 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/915913"
},
{
"category": "external",
"summary": "SUSE Bug 916239 for CVE-2014-0224",
"url": "https://bugzilla.suse.com/916239"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2014-0224"
},
{
"cve": "CVE-2015-3193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3193"
}
],
"notes": [
{
"category": "general",
"text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3193",
"url": "https://www.suse.com/security/cve/CVE-2015-3193"
},
{
"category": "external",
"summary": "SUSE Bug 1022086 for CVE-2015-3193",
"url": "https://bugzilla.suse.com/1022086"
},
{
"category": "external",
"summary": "SUSE Bug 1066242 for CVE-2015-3193",
"url": "https://bugzilla.suse.com/1066242"
},
{
"category": "external",
"summary": "SUSE Bug 1071906 for CVE-2015-3193",
"url": "https://bugzilla.suse.com/1071906"
},
{
"category": "external",
"summary": "SUSE Bug 957814 for CVE-2015-3193",
"url": "https://bugzilla.suse.com/957814"
},
{
"category": "external",
"summary": "SUSE Bug 960151 for CVE-2015-3193",
"url": "https://bugzilla.suse.com/960151"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2015-3193",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2015-3193"
},
{
"cve": "CVE-2015-3194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3194"
}
],
"notes": [
{
"category": "general",
"text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3194",
"url": "https://www.suse.com/security/cve/CVE-2015-3194"
},
{
"category": "external",
"summary": "SUSE Bug 957812 for CVE-2015-3194",
"url": "https://bugzilla.suse.com/957812"
},
{
"category": "external",
"summary": "SUSE Bug 957815 for CVE-2015-3194",
"url": "https://bugzilla.suse.com/957815"
},
{
"category": "external",
"summary": "SUSE Bug 958768 for CVE-2015-3194",
"url": "https://bugzilla.suse.com/958768"
},
{
"category": "external",
"summary": "SUSE Bug 976341 for CVE-2015-3194",
"url": "https://bugzilla.suse.com/976341"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2015-3194",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2015-3194"
},
{
"cve": "CVE-2015-5380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5380"
}
],
"notes": [
{
"category": "general",
"text": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5380",
"url": "https://www.suse.com/security/cve/CVE-2015-5380"
},
{
"category": "external",
"summary": "SUSE Bug 937414 for CVE-2015-5380",
"url": "https://bugzilla.suse.com/937414"
},
{
"category": "external",
"summary": "SUSE Bug 937416 for CVE-2015-5380",
"url": "https://bugzilla.suse.com/937416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2015-5380"
},
{
"cve": "CVE-2015-7384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7384"
}
],
"notes": [
{
"category": "general",
"text": "Node.js 4.0.0, 4.1.0, and 4.1.1 allows remote attackers to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7384",
"url": "https://www.suse.com/security/cve/CVE-2015-7384"
},
{
"category": "external",
"summary": "SUSE Bug 948602 for CVE-2015-7384",
"url": "https://bugzilla.suse.com/948602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2015-7384"
},
{
"cve": "CVE-2016-2086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2086"
}
],
"notes": [
{
"category": "general",
"text": "Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2086",
"url": "https://www.suse.com/security/cve/CVE-2016-2086"
},
{
"category": "external",
"summary": "SUSE Bug 966076 for CVE-2016-2086",
"url": "https://bugzilla.suse.com/966076"
},
{
"category": "external",
"summary": "SUSE Bug 966077 for CVE-2016-2086",
"url": "https://bugzilla.suse.com/966077"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-2086"
},
{
"cve": "CVE-2016-2178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2178"
}
],
"notes": [
{
"category": "general",
"text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2178",
"url": "https://www.suse.com/security/cve/CVE-2016-2178"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 983249 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983249"
},
{
"category": "external",
"summary": "SUSE Bug 983519 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983519"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2016-2178"
},
{
"cve": "CVE-2016-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2183"
}
],
"notes": [
{
"category": "general",
"text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2183",
"url": "https://www.suse.com/security/cve/CVE-2016-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1001912 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1001912"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1024218"
},
{
"category": "external",
"summary": "SUSE Bug 1027038 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1027038"
},
{
"category": "external",
"summary": "SUSE Bug 1034689 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1034689"
},
{
"category": "external",
"summary": "SUSE Bug 1056614 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1056614"
},
{
"category": "external",
"summary": "SUSE Bug 1171693 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1171693"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995359 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/995359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2016-2216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2216"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2216",
"url": "https://www.suse.com/security/cve/CVE-2016-2216"
},
{
"category": "external",
"summary": "SUSE Bug 966076 for CVE-2016-2216",
"url": "https://bugzilla.suse.com/966076"
},
{
"category": "external",
"summary": "SUSE Bug 966077 for CVE-2016-2216",
"url": "https://bugzilla.suse.com/966077"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-2216"
},
{
"cve": "CVE-2016-5172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5172"
}
],
"notes": [
{
"category": "general",
"text": "The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5172",
"url": "https://www.suse.com/security/cve/CVE-2016-5172"
},
{
"category": "external",
"summary": "SUSE Bug 998743 for CVE-2016-5172",
"url": "https://bugzilla.suse.com/998743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2016-5172"
},
{
"cve": "CVE-2016-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5325"
}
],
"notes": [
{
"category": "general",
"text": "CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5325",
"url": "https://www.suse.com/security/cve/CVE-2016-5325"
},
{
"category": "external",
"summary": "SUSE Bug 985201 for CVE-2016-5325",
"url": "https://bugzilla.suse.com/985201"
},
{
"category": "external",
"summary": "SUSE Bug 985202 for CVE-2016-5325",
"url": "https://bugzilla.suse.com/985202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2016-5325"
},
{
"cve": "CVE-2016-6304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6304"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6304",
"url": "https://www.suse.com/security/cve/CVE-2016-6304"
},
{
"category": "external",
"summary": "SUSE Bug 1001706 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1001706"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1005579 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1005579"
},
{
"category": "external",
"summary": "SUSE Bug 1021375 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1021375"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999666 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-6304"
},
{
"cve": "CVE-2016-6306",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6306"
}
],
"notes": [
{
"category": "general",
"text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6306",
"url": "https://www.suse.com/security/cve/CVE-2016-6306"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999668 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999668"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2016-6306"
},
{
"cve": "CVE-2016-7052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7052"
}
],
"notes": [
{
"category": "general",
"text": "crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7052",
"url": "https://www.suse.com/security/cve/CVE-2016-7052"
},
{
"category": "external",
"summary": "SUSE Bug 1001148 for CVE-2016-7052",
"url": "https://bugzilla.suse.com/1001148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2016-7052"
},
{
"cve": "CVE-2016-7099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7099"
}
],
"notes": [
{
"category": "general",
"text": "The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7099",
"url": "https://www.suse.com/security/cve/CVE-2016-7099"
},
{
"category": "external",
"summary": "SUSE Bug 1001652 for CVE-2016-7099",
"url": "https://bugzilla.suse.com/1001652"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2016-7099"
},
{
"cve": "CVE-2017-1000381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000381"
}
],
"notes": [
{
"category": "general",
"text": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000381",
"url": "https://www.suse.com/security/cve/CVE-2017-1000381"
},
{
"category": "external",
"summary": "SUSE Bug 1044946 for CVE-2017-1000381",
"url": "https://bugzilla.suse.com/1044946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2017-1000381"
},
{
"cve": "CVE-2017-10686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10686"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there are multiple heap use after free vulnerabilities in the tool nasm. The related heap is allocated in the token() function and freed in the detoken() function (called by pp_getline()) - it is used again at multiple positions later that could cause multiple damages. For example, it causes a corrupted double-linked list in detoken(), a double free or corruption in delete_Token(), and an out-of-bounds write in detoken(). It has a high possibility to lead to a remote code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10686",
"url": "https://www.suse.com/security/cve/CVE-2017-10686"
},
{
"category": "external",
"summary": "SUSE Bug 1047936 for CVE-2017-10686",
"url": "https://bugzilla.suse.com/1047936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-10686"
},
{
"cve": "CVE-2017-11111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11111"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, preproc.c allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11111",
"url": "https://www.suse.com/security/cve/CVE-2017-11111"
},
{
"category": "external",
"summary": "SUSE Bug 1047925 for CVE-2017-11111",
"url": "https://bugzilla.suse.com/1047925"
},
{
"category": "external",
"summary": "SUSE Bug 1073798 for CVE-2017-11111",
"url": "https://bugzilla.suse.com/1073798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-11111"
},
{
"cve": "CVE-2017-11499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11499"
}
],
"notes": [
{
"category": "general",
"text": "Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11499",
"url": "https://www.suse.com/security/cve/CVE-2017-11499"
},
{
"category": "external",
"summary": "SUSE Bug 1044849 for CVE-2017-11499",
"url": "https://bugzilla.suse.com/1044849"
},
{
"category": "external",
"summary": "SUSE Bug 1048299 for CVE-2017-11499",
"url": "https://bugzilla.suse.com/1048299"
},
{
"category": "external",
"summary": "SUSE Bug 1051117 for CVE-2017-11499",
"url": "https://bugzilla.suse.com/1051117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2017-11499"
},
{
"cve": "CVE-2017-14228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14228"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function paste_tokens() in preproc.c, aka a NULL pointer dereference. It will lead to remote denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14228",
"url": "https://www.suse.com/security/cve/CVE-2017-14228"
},
{
"category": "external",
"summary": "SUSE Bug 1058013 for CVE-2017-14228",
"url": "https://bugzilla.suse.com/1058013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-14228"
},
{
"cve": "CVE-2017-14849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14849"
}
],
"notes": [
{
"category": "general",
"text": "Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to \"..\" handling was incompatible with the pathname validation used by unspecified community modules.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14849",
"url": "https://www.suse.com/security/cve/CVE-2017-14849"
},
{
"category": "external",
"summary": "SUSE Bug 1060820 for CVE-2017-14849",
"url": "https://bugzilla.suse.com/1060820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2017-14849"
},
{
"cve": "CVE-2017-14919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14919"
}
],
"notes": [
{
"category": "general",
"text": "Node.js before 4.8.5, 6.x before 6.11.5, and 8.x before 8.8.0 allows remote attackers to cause a denial of service (uncaught exception and crash) by leveraging a change in the zlib module 1.2.9 making 8 an invalid value for the windowBits parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14919",
"url": "https://www.suse.com/security/cve/CVE-2017-14919"
},
{
"category": "external",
"summary": "SUSE Bug 1059050 for CVE-2017-14919",
"url": "https://bugzilla.suse.com/1059050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-14919"
},
{
"cve": "CVE-2017-15896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15896"
}
],
"notes": [
{
"category": "general",
"text": "Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15896",
"url": "https://www.suse.com/security/cve/CVE-2017-15896"
},
{
"category": "external",
"summary": "SUSE Bug 1071905 for CVE-2017-15896",
"url": "https://bugzilla.suse.com/1071905"
},
{
"category": "external",
"summary": "SUSE Bug 1072322 for CVE-2017-15896",
"url": "https://bugzilla.suse.com/1072322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-15896"
},
{
"cve": "CVE-2017-15897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15897"
}
],
"notes": [
{
"category": "general",
"text": "Node.js had a bug in versions 8.X and 9.X which caused buffers to not be initialized when the encoding for the fill value did not match the encoding specified. For example, \u0027Buffer.alloc(0x100, \"This is not correctly encoded\", \"hex\");\u0027 The buffer implementation was updated such that the buffer will be initialized to all zeros in these cases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15897",
"url": "https://www.suse.com/security/cve/CVE-2017-15897"
},
{
"category": "external",
"summary": "SUSE Bug 1072320 for CVE-2017-15897",
"url": "https://bugzilla.suse.com/1072320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-15897"
},
{
"cve": "CVE-2017-17810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17810"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a \"SEGV on unknown address\" that will cause a remote denial of service attack, because asm/preproc.c mishandles macro calls that have the wrong number of arguments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17810",
"url": "https://www.suse.com/security/cve/CVE-2017-17810"
},
{
"category": "external",
"summary": "SUSE Bug 1073796 for CVE-2017-17810",
"url": "https://bugzilla.suse.com/1073796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17810"
},
{
"cve": "CVE-2017-17811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17811"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer overflow that will cause a remote denial of service attack, related to a strcpy in paste_tokens in asm/preproc.c, a similar issue to CVE-2017-11111.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17811",
"url": "https://www.suse.com/security/cve/CVE-2017-17811"
},
{
"category": "external",
"summary": "SUSE Bug 1073798 for CVE-2017-17811",
"url": "https://bugzilla.suse.com/1073798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17811"
},
{
"cve": "CVE-2017-17812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17812"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read in the function detoken() in asm/preproc.c that will cause a remote denial of service attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17812",
"url": "https://www.suse.com/security/cve/CVE-2017-17812"
},
{
"category": "external",
"summary": "SUSE Bug 1073799 for CVE-2017-17812",
"url": "https://bugzilla.suse.com/1073799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17812"
},
{
"cve": "CVE-2017-17813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17813"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in the pp_list_one_macro function in asm/preproc.c that will cause a remote denial of service attack, related to mishandling of line-syntax errors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17813",
"url": "https://www.suse.com/security/cve/CVE-2017-17813"
},
{
"category": "external",
"summary": "SUSE Bug 1073803 for CVE-2017-17813",
"url": "https://bugzilla.suse.com/1073803"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17813"
},
{
"cve": "CVE-2017-17814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17814"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in do_directive in asm/preproc.c that will cause a remote denial of service attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17814",
"url": "https://www.suse.com/security/cve/CVE-2017-17814"
},
{
"category": "external",
"summary": "SUSE Bug 1073808 for CVE-2017-17814",
"url": "https://bugzilla.suse.com/1073808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17814"
},
{
"cve": "CVE-2017-17815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17815"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in is_mmacro() in asm/preproc.c that will cause a remote denial of service attack, because of a missing check for the relationship between minimum and maximum parameter counts.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17815",
"url": "https://www.suse.com/security/cve/CVE-2017-17815"
},
{
"category": "external",
"summary": "SUSE Bug 1073818 for CVE-2017-17815",
"url": "https://bugzilla.suse.com/1073818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17815"
},
{
"cve": "CVE-2017-17816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17816"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_getline in asm/preproc.c that will cause a remote denial of service attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17816",
"url": "https://www.suse.com/security/cve/CVE-2017-17816"
},
{
"category": "external",
"summary": "SUSE Bug 1073823 for CVE-2017-17816",
"url": "https://bugzilla.suse.com/1073823"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17816"
},
{
"cve": "CVE-2017-17817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17817"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_verror in asm/preproc.c that will cause a remote denial of service attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17817",
"url": "https://www.suse.com/security/cve/CVE-2017-17817"
},
{
"category": "external",
"summary": "SUSE Bug 1073829 for CVE-2017-17817",
"url": "https://bugzilla.suse.com/1073829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17817"
},
{
"cve": "CVE-2017-17818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17818"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read that will cause a remote denial of service attack, related to a while loop in paste_tokens in asm/preproc.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17818",
"url": "https://www.suse.com/security/cve/CVE-2017-17818"
},
{
"category": "external",
"summary": "SUSE Bug 1073830 for CVE-2017-17818",
"url": "https://bugzilla.suse.com/1073830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17818"
},
{
"cve": "CVE-2017-17819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17819"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function find_cc() in asm/preproc.c that will cause a remote denial of service attack, because pointers associated with skip_white_ calls are not validated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17819",
"url": "https://www.suse.com/security/cve/CVE-2017-17819"
},
{
"category": "external",
"summary": "SUSE Bug 1073832 for CVE-2017-17819",
"url": "https://bugzilla.suse.com/1073832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17819"
},
{
"cve": "CVE-2017-17820",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17820"
}
],
"notes": [
{
"category": "general",
"text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_list_one_macro in asm/preproc.c that will lead to a remote denial of service attack, related to mishandling of operand-type errors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17820",
"url": "https://www.suse.com/security/cve/CVE-2017-17820"
},
{
"category": "external",
"summary": "SUSE Bug 1073846 for CVE-2017-17820",
"url": "https://bugzilla.suse.com/1073846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-17820"
},
{
"cve": "CVE-2017-18207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18207"
}
],
"notes": [
{
"category": "general",
"text": "The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18207",
"url": "https://www.suse.com/security/cve/CVE-2017-18207"
},
{
"category": "external",
"summary": "SUSE Bug 1083507 for CVE-2017-18207",
"url": "https://bugzilla.suse.com/1083507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-18207"
},
{
"cve": "CVE-2017-3735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3735"
}
],
"notes": [
{
"category": "general",
"text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3735",
"url": "https://www.suse.com/security/cve/CVE-2017-3735"
},
{
"category": "external",
"summary": "SUSE Bug 1056058 for CVE-2017-3735",
"url": "https://bugzilla.suse.com/1056058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-3735"
},
{
"cve": "CVE-2017-3736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3736"
}
],
"notes": [
{
"category": "general",
"text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3736",
"url": "https://www.suse.com/security/cve/CVE-2017-3736"
},
{
"category": "external",
"summary": "SUSE Bug 1066242 for CVE-2017-3736",
"url": "https://bugzilla.suse.com/1066242"
},
{
"category": "external",
"summary": "SUSE Bug 1071906 for CVE-2017-3736",
"url": "https://bugzilla.suse.com/1071906"
},
{
"category": "external",
"summary": "SUSE Bug 1076369 for CVE-2017-3736",
"url": "https://bugzilla.suse.com/1076369"
},
{
"category": "external",
"summary": "SUSE Bug 957814 for CVE-2017-3736",
"url": "https://bugzilla.suse.com/957814"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-3736"
},
{
"cve": "CVE-2017-3738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3738"
}
],
"notes": [
{
"category": "general",
"text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3738",
"url": "https://www.suse.com/security/cve/CVE-2017-3738"
},
{
"category": "external",
"summary": "SUSE Bug 1071906 for CVE-2017-3738",
"url": "https://bugzilla.suse.com/1071906"
},
{
"category": "external",
"summary": "SUSE Bug 1097757 for CVE-2017-3738",
"url": "https://bugzilla.suse.com/1097757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2017-3738"
},
{
"cve": "CVE-2018-0732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0732"
}
],
"notes": [
{
"category": "general",
"text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0732",
"url": "https://www.suse.com/security/cve/CVE-2018-0732"
},
{
"category": "external",
"summary": "SUSE Bug 1077628 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1077628"
},
{
"category": "external",
"summary": "SUSE Bug 1097158 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1097158"
},
{
"category": "external",
"summary": "SUSE Bug 1099502 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1099502"
},
{
"category": "external",
"summary": "SUSE Bug 1106692 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1106692"
},
{
"category": "external",
"summary": "SUSE Bug 1108542 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1108542"
},
{
"category": "external",
"summary": "SUSE Bug 1110163 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1110163"
},
{
"category": "external",
"summary": "SUSE Bug 1112097 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1112097"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1122198"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2018-0732",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2018-0732"
},
{
"cve": "CVE-2018-1000168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000168"
}
],
"notes": [
{
"category": "general",
"text": "nghttp2 version \u003e= 1.10.0 and nghttp2 \u003c= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in \u003e= 1.31.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000168",
"url": "https://www.suse.com/security/cve/CVE-2018-1000168"
},
{
"category": "external",
"summary": "SUSE Bug 1088639 for CVE-2018-1000168",
"url": "https://bugzilla.suse.com/1088639"
},
{
"category": "external",
"summary": "SUSE Bug 1097401 for CVE-2018-1000168",
"url": "https://bugzilla.suse.com/1097401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000168"
},
{
"cve": "CVE-2018-12115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12115"
}
],
"notes": [
{
"category": "general",
"text": "In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `\u0027ucs2\u0027`, `\u0027ucs-2\u0027`, `\u0027utf16le\u0027` and `\u0027utf-16le\u0027`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12115",
"url": "https://www.suse.com/security/cve/CVE-2018-12115"
},
{
"category": "external",
"summary": "SUSE Bug 1105019 for CVE-2018-12115",
"url": "https://bugzilla.suse.com/1105019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2018-12115"
},
{
"cve": "CVE-2018-12116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12116"
}
],
"notes": [
{
"category": "general",
"text": "Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12116",
"url": "https://www.suse.com/security/cve/CVE-2018-12116"
},
{
"category": "external",
"summary": "SUSE Bug 1117630 for CVE-2018-12116",
"url": "https://bugzilla.suse.com/1117630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-12116"
},
{
"cve": "CVE-2018-12121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12121"
}
],
"notes": [
{
"category": "general",
"text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12121",
"url": "https://www.suse.com/security/cve/CVE-2018-12121"
},
{
"category": "external",
"summary": "SUSE Bug 1117626 for CVE-2018-12121",
"url": "https://bugzilla.suse.com/1117626"
},
{
"category": "external",
"summary": "SUSE Bug 1127532 for CVE-2018-12121",
"url": "https://bugzilla.suse.com/1127532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2018-12121"
},
{
"cve": "CVE-2018-12122",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12122"
}
],
"notes": [
{
"category": "general",
"text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Slowloris HTTP Denial of Service: An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12122",
"url": "https://www.suse.com/security/cve/CVE-2018-12122"
},
{
"category": "external",
"summary": "SUSE Bug 1117627 for CVE-2018-12122",
"url": "https://bugzilla.suse.com/1117627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2018-12122"
},
{
"cve": "CVE-2018-12123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12123"
}
],
"notes": [
{
"category": "general",
"text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12123",
"url": "https://www.suse.com/security/cve/CVE-2018-12123"
},
{
"category": "external",
"summary": "SUSE Bug 1117629 for CVE-2018-12123",
"url": "https://bugzilla.suse.com/1117629"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-12123"
},
{
"cve": "CVE-2018-20406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20406"
}
],
"notes": [
{
"category": "general",
"text": "Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a \"resize to twice the size\" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20406",
"url": "https://www.suse.com/security/cve/CVE-2018-20406"
},
{
"category": "external",
"summary": "SUSE Bug 1120644 for CVE-2018-20406",
"url": "https://bugzilla.suse.com/1120644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-20406"
},
{
"cve": "CVE-2018-20852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20852"
}
],
"notes": [
{
"category": "general",
"text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20852",
"url": "https://www.suse.com/security/cve/CVE-2018-20852"
},
{
"category": "external",
"summary": "SUSE Bug 1141853 for CVE-2018-20852",
"url": "https://bugzilla.suse.com/1141853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-20852"
},
{
"cve": "CVE-2018-7158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7158"
}
],
"notes": [
{
"category": "general",
"text": "The `\u0027path\u0027` module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector. The code in question was replaced in Node.js 6.x and later so this vulnerability only impacts all versions of Node.js 4.x. The regular expression, `splitPathRe`, used within the `\u0027path\u0027` module for the various path parsing functions, including `path.dirname()`, `path.extname()` and `path.parse()` was structured in such a way as to allow an attacker to craft a string, that when passed through one of these functions, could take a significant amount of time to evaluate, potentially leading to a full denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7158",
"url": "https://www.suse.com/security/cve/CVE-2018-7158"
},
{
"category": "external",
"summary": "SUSE Bug 1087459 for CVE-2018-7158",
"url": "https://bugzilla.suse.com/1087459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-7158"
},
{
"cve": "CVE-2018-7159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7159"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7159",
"url": "https://www.suse.com/security/cve/CVE-2018-7159"
},
{
"category": "external",
"summary": "SUSE Bug 1087453 for CVE-2018-7159",
"url": "https://bugzilla.suse.com/1087453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2018-7159"
},
{
"cve": "CVE-2018-7160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7160"
}
],
"notes": [
{
"category": "general",
"text": "The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7160",
"url": "https://www.suse.com/security/cve/CVE-2018-7160"
},
{
"category": "external",
"summary": "SUSE Bug 1087463 for CVE-2018-7160",
"url": "https://bugzilla.suse.com/1087463"
},
{
"category": "external",
"summary": "SUSE Bug 1182620 for CVE-2018-7160",
"url": "https://bugzilla.suse.com/1182620"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-7160"
},
{
"cve": "CVE-2018-7161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7161"
}
],
"notes": [
{
"category": "general",
"text": "All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7161",
"url": "https://www.suse.com/security/cve/CVE-2018-7161"
},
{
"category": "external",
"summary": "SUSE Bug 1097404 for CVE-2018-7161",
"url": "https://bugzilla.suse.com/1097404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-7161"
},
{
"cve": "CVE-2018-7167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7167"
}
],
"notes": [
{
"category": "general",
"text": "Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS \"Boron\"), 8.x (LTS \"Carbon\"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7167",
"url": "https://www.suse.com/security/cve/CVE-2018-7167"
},
{
"category": "external",
"summary": "SUSE Bug 1097375 for CVE-2018-7167",
"url": "https://bugzilla.suse.com/1097375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-7167"
},
{
"cve": "CVE-2019-10160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10160"
}
],
"notes": [
{
"category": "general",
"text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10160",
"url": "https://www.suse.com/security/cve/CVE-2019-10160"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-10160",
"url": "https://bugzilla.suse.com/1138459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-10160"
},
{
"cve": "CVE-2019-11709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11709"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11709",
"url": "https://www.suse.com/security/cve/CVE-2019-11709"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11709",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11709"
},
{
"cve": "CVE-2019-11710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11710"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11710",
"url": "https://www.suse.com/security/cve/CVE-2019-11710"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11710",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11710"
},
{
"cve": "CVE-2019-11711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11711"
}
],
"notes": [
{
"category": "general",
"text": "When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11711",
"url": "https://www.suse.com/security/cve/CVE-2019-11711"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11711",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11711"
},
{
"cve": "CVE-2019-11712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11712"
}
],
"notes": [
{
"category": "general",
"text": "POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11712",
"url": "https://www.suse.com/security/cve/CVE-2019-11712"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11712",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11712"
},
{
"cve": "CVE-2019-11713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11713"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11713",
"url": "https://www.suse.com/security/cve/CVE-2019-11713"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11713",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11713"
},
{
"cve": "CVE-2019-11714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11714"
}
],
"notes": [
{
"category": "general",
"text": "Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11714",
"url": "https://www.suse.com/security/cve/CVE-2019-11714"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11714",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11714"
},
{
"cve": "CVE-2019-11715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11715"
}
],
"notes": [
{
"category": "general",
"text": "Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11715",
"url": "https://www.suse.com/security/cve/CVE-2019-11715"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11715",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11715"
},
{
"cve": "CVE-2019-11716",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11716"
}
],
"notes": [
{
"category": "general",
"text": "Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11716",
"url": "https://www.suse.com/security/cve/CVE-2019-11716"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11716",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11716"
},
{
"cve": "CVE-2019-11717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11717"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where the caret (\"^\") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11717",
"url": "https://www.suse.com/security/cve/CVE-2019-11717"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11717",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11717"
},
{
"cve": "CVE-2019-11718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11718"
}
],
"notes": [
{
"category": "general",
"text": "Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11718",
"url": "https://www.suse.com/security/cve/CVE-2019-11718"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11718",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11718"
},
{
"cve": "CVE-2019-11719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11719"
}
],
"notes": [
{
"category": "general",
"text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11719",
"url": "https://www.suse.com/security/cve/CVE-2019-11719"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11719",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11720"
}
],
"notes": [
{
"category": "general",
"text": "Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11720",
"url": "https://www.suse.com/security/cve/CVE-2019-11720"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11720",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11720"
},
{
"cve": "CVE-2019-11721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11721"
}
],
"notes": [
{
"category": "general",
"text": "The unicode latin \u0027kra\u0027 character can be used to spoof a standard \u0027k\u0027 character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11721",
"url": "https://www.suse.com/security/cve/CVE-2019-11721"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11721",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11721"
},
{
"cve": "CVE-2019-11723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11723"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11723",
"url": "https://www.suse.com/security/cve/CVE-2019-11723"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11723",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11723"
},
{
"cve": "CVE-2019-11724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11724"
}
],
"notes": [
{
"category": "general",
"text": "Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11724",
"url": "https://www.suse.com/security/cve/CVE-2019-11724"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11724",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11724"
},
{
"cve": "CVE-2019-11725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11725"
}
],
"notes": [
{
"category": "general",
"text": "When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11725",
"url": "https://www.suse.com/security/cve/CVE-2019-11725"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11725",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11725"
},
{
"cve": "CVE-2019-11727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11727"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11727",
"url": "https://www.suse.com/security/cve/CVE-2019-11727"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "external",
"summary": "SUSE Bug 1141322 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1141322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11728"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11728",
"url": "https://www.suse.com/security/cve/CVE-2019-11728"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11728",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11728"
},
{
"cve": "CVE-2019-11729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11729"
}
],
"notes": [
{
"category": "general",
"text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11729",
"url": "https://www.suse.com/security/cve/CVE-2019-11729"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11729",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11729"
},
{
"cve": "CVE-2019-11730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11730"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app\u0027s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11730",
"url": "https://www.suse.com/security/cve/CVE-2019-11730"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11730",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11730"
},
{
"cve": "CVE-2019-11733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11733"
}
],
"notes": [
{
"category": "general",
"text": "When a master password is set, it is required to be entered again before stored passwords can be accessed in the \u0027Saved Logins\u0027 dialog. It was found that locally stored passwords can be copied to the clipboard thorough the \u0027copy password\u0027 context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox \u003c 68.0.2 and Firefox ESR \u003c 68.0.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11733",
"url": "https://www.suse.com/security/cve/CVE-2019-11733"
},
{
"category": "external",
"summary": "SUSE Bug 1145665 for CVE-2019-11733",
"url": "https://bugzilla.suse.com/1145665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-11733"
},
{
"cve": "CVE-2019-11735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11735"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11735",
"url": "https://www.suse.com/security/cve/CVE-2019-11735"
},
{
"category": "external",
"summary": "SUSE Bug 1149293 for CVE-2019-11735",
"url": "https://bugzilla.suse.com/1149293"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11735",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11735",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11735"
},
{
"cve": "CVE-2019-11736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11736"
}
],
"notes": [
{
"category": "general",
"text": "The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. \u003cbr\u003e*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11736",
"url": "https://www.suse.com/security/cve/CVE-2019-11736"
},
{
"category": "external",
"summary": "SUSE Bug 1149292 for CVE-2019-11736",
"url": "https://bugzilla.suse.com/1149292"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11736",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11736",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11736"
},
{
"cve": "CVE-2019-11738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11738"
}
],
"notes": [
{
"category": "general",
"text": "If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11738",
"url": "https://www.suse.com/security/cve/CVE-2019-11738"
},
{
"category": "external",
"summary": "SUSE Bug 1149302 for CVE-2019-11738",
"url": "https://bugzilla.suse.com/1149302"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11738",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11738",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-11738"
},
{
"cve": "CVE-2019-11740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11740"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11740",
"url": "https://www.suse.com/security/cve/CVE-2019-11740"
},
{
"category": "external",
"summary": "SUSE Bug 1149299 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11740"
},
{
"cve": "CVE-2019-11742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11742"
}
],
"notes": [
{
"category": "general",
"text": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11742",
"url": "https://www.suse.com/security/cve/CVE-2019-11742"
},
{
"category": "external",
"summary": "SUSE Bug 1149303 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11742"
},
{
"cve": "CVE-2019-11743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11743"
}
],
"notes": [
{
"category": "general",
"text": "Navigation events were not fully adhering to the W3C\u0027s \"Navigation-Timing Level 2\" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11743",
"url": "https://www.suse.com/security/cve/CVE-2019-11743"
},
{
"category": "external",
"summary": "SUSE Bug 1149298 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-11743"
},
{
"cve": "CVE-2019-11744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11744"
}
],
"notes": [
{
"category": "general",
"text": "Some HTML elements, such as \u0026lt;title\u0026gt; and \u0026lt;textarea\u0026gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11744",
"url": "https://www.suse.com/security/cve/CVE-2019-11744"
},
{
"category": "external",
"summary": "SUSE Bug 1149304 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11744"
},
{
"cve": "CVE-2019-11746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11746"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11746",
"url": "https://www.suse.com/security/cve/CVE-2019-11746"
},
{
"category": "external",
"summary": "SUSE Bug 1149297 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11746"
},
{
"cve": "CVE-2019-11747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11747"
}
],
"notes": [
{
"category": "general",
"text": "The \"Forget about this site\" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site\u0027s HSTS setting will be restored. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11747",
"url": "https://www.suse.com/security/cve/CVE-2019-11747"
},
{
"category": "external",
"summary": "SUSE Bug 1149301 for CVE-2019-11747",
"url": "https://bugzilla.suse.com/1149301"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11747",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11747",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2019-11747"
},
{
"cve": "CVE-2019-11748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11748"
}
],
"notes": [
{
"category": "general",
"text": "WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11748",
"url": "https://www.suse.com/security/cve/CVE-2019-11748"
},
{
"category": "external",
"summary": "SUSE Bug 1149291 for CVE-2019-11748",
"url": "https://bugzilla.suse.com/1149291"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11748",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11748",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-11748"
},
{
"cve": "CVE-2019-11749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11749"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11749",
"url": "https://www.suse.com/security/cve/CVE-2019-11749"
},
{
"category": "external",
"summary": "SUSE Bug 1149290 for CVE-2019-11749",
"url": "https://bugzilla.suse.com/1149290"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11749",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11749",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-11749"
},
{
"cve": "CVE-2019-11750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11750"
}
],
"notes": [
{
"category": "general",
"text": "A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11750",
"url": "https://www.suse.com/security/cve/CVE-2019-11750"
},
{
"category": "external",
"summary": "SUSE Bug 1149289 for CVE-2019-11750",
"url": "https://bugzilla.suse.com/1149289"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11750",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11750",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-11750"
},
{
"cve": "CVE-2019-11751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11751"
}
],
"notes": [
{
"category": "general",
"text": "Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows \u0027Startup\u0027 folder. \u003cbr\u003e*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11751",
"url": "https://www.suse.com/security/cve/CVE-2019-11751"
},
{
"category": "external",
"summary": "SUSE Bug 1149286 for CVE-2019-11751",
"url": "https://bugzilla.suse.com/1149286"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11751",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11751",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11751"
},
{
"cve": "CVE-2019-11752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11752"
}
],
"notes": [
{
"category": "general",
"text": "It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11752",
"url": "https://www.suse.com/security/cve/CVE-2019-11752"
},
{
"category": "external",
"summary": "SUSE Bug 1149296 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11752"
},
{
"cve": "CVE-2019-11753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11753"
}
],
"notes": [
{
"category": "general",
"text": "The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. \u003cbr\u003e*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11753",
"url": "https://www.suse.com/security/cve/CVE-2019-11753"
},
{
"category": "external",
"summary": "SUSE Bug 1149295 for CVE-2019-11753",
"url": "https://bugzilla.suse.com/1149295"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11753",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11753",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11753"
},
{
"cve": "CVE-2019-11757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11757"
}
],
"notes": [
{
"category": "general",
"text": "When following the value\u0027s prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11757",
"url": "https://www.suse.com/security/cve/CVE-2019-11757"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-11757",
"url": "https://bugzilla.suse.com/1154738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11757"
},
{
"cve": "CVE-2019-11758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11758"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11758",
"url": "https://www.suse.com/security/cve/CVE-2019-11758"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-11758",
"url": "https://bugzilla.suse.com/1154738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11758"
},
{
"cve": "CVE-2019-11759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11759"
}
],
"notes": [
{
"category": "general",
"text": "An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11759",
"url": "https://www.suse.com/security/cve/CVE-2019-11759"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-11759",
"url": "https://bugzilla.suse.com/1154738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11759"
},
{
"cve": "CVE-2019-11760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11760"
}
],
"notes": [
{
"category": "general",
"text": "A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11760",
"url": "https://www.suse.com/security/cve/CVE-2019-11760"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-11760",
"url": "https://bugzilla.suse.com/1154738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11760"
},
{
"cve": "CVE-2019-11761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11761"
}
],
"notes": [
{
"category": "general",
"text": "By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11761",
"url": "https://www.suse.com/security/cve/CVE-2019-11761"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-11761",
"url": "https://bugzilla.suse.com/1154738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11761"
},
{
"cve": "CVE-2019-11762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11762"
}
],
"notes": [
{
"category": "general",
"text": "If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11762",
"url": "https://www.suse.com/security/cve/CVE-2019-11762"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-11762",
"url": "https://bugzilla.suse.com/1154738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11762"
},
{
"cve": "CVE-2019-11763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11763"
}
],
"notes": [
{
"category": "general",
"text": "Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11763",
"url": "https://www.suse.com/security/cve/CVE-2019-11763"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-11763",
"url": "https://bugzilla.suse.com/1154738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11763"
},
{
"cve": "CVE-2019-11764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11764"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11764",
"url": "https://www.suse.com/security/cve/CVE-2019-11764"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-11764",
"url": "https://bugzilla.suse.com/1154738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-11764"
},
{
"cve": "CVE-2019-13173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13173"
}
],
"notes": [
{
"category": "general",
"text": "fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13173",
"url": "https://www.suse.com/security/cve/CVE-2019-13173"
},
{
"category": "external",
"summary": "SUSE Bug 1140290 for CVE-2019-13173",
"url": "https://bugzilla.suse.com/1140290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-13173"
},
{
"cve": "CVE-2019-15903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15903"
}
],
"notes": [
{
"category": "general",
"text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15903",
"url": "https://www.suse.com/security/cve/CVE-2019-15903"
},
{
"category": "external",
"summary": "SUSE Bug 1149429 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1149429"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154738"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-15903"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-5737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5737"
}
],
"notes": [
{
"category": "general",
"text": "In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5737",
"url": "https://www.suse.com/security/cve/CVE-2019-5737"
},
{
"category": "external",
"summary": "SUSE Bug 1127532 for CVE-2019-5737",
"url": "https://bugzilla.suse.com/1127532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-5737"
},
{
"cve": "CVE-2019-9511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9511"
}
],
"notes": [
{
"category": "general",
"text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9511",
"url": "https://www.suse.com/security/cve/CVE-2019-9511"
},
{
"category": "external",
"summary": "SUSE Bug 1145579 for CVE-2019-9511",
"url": "https://bugzilla.suse.com/1145579"
},
{
"category": "external",
"summary": "SUSE Bug 1146091 for CVE-2019-9511",
"url": "https://bugzilla.suse.com/1146091"
},
{
"category": "external",
"summary": "SUSE Bug 1146182 for CVE-2019-9511",
"url": "https://bugzilla.suse.com/1146182"
},
{
"category": "external",
"summary": "SUSE Bug 1193427 for CVE-2019-9511",
"url": "https://bugzilla.suse.com/1193427"
},
{
"category": "external",
"summary": "SUSE Bug 1202787 for CVE-2019-9511",
"url": "https://bugzilla.suse.com/1202787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2019-9511"
},
{
"cve": "CVE-2019-9512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9512"
}
],
"notes": [
{
"category": "general",
"text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9512",
"url": "https://www.suse.com/security/cve/CVE-2019-9512"
},
{
"category": "external",
"summary": "SUSE Bug 1145663 for CVE-2019-9512",
"url": "https://bugzilla.suse.com/1145663"
},
{
"category": "external",
"summary": "SUSE Bug 1146099 for CVE-2019-9512",
"url": "https://bugzilla.suse.com/1146099"
},
{
"category": "external",
"summary": "SUSE Bug 1146111 for CVE-2019-9512",
"url": "https://bugzilla.suse.com/1146111"
},
{
"category": "external",
"summary": "SUSE Bug 1147142 for CVE-2019-9512",
"url": "https://bugzilla.suse.com/1147142"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-9512"
},
{
"cve": "CVE-2019-9513",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9513"
}
],
"notes": [
{
"category": "general",
"text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9513",
"url": "https://www.suse.com/security/cve/CVE-2019-9513"
},
{
"category": "external",
"summary": "SUSE Bug 1145580 for CVE-2019-9513",
"url": "https://bugzilla.suse.com/1145580"
},
{
"category": "external",
"summary": "SUSE Bug 1146094 for CVE-2019-9513",
"url": "https://bugzilla.suse.com/1146094"
},
{
"category": "external",
"summary": "SUSE Bug 1146184 for CVE-2019-9513",
"url": "https://bugzilla.suse.com/1146184"
},
{
"category": "external",
"summary": "SUSE Bug 1193427 for CVE-2019-9513",
"url": "https://bugzilla.suse.com/1193427"
},
{
"category": "external",
"summary": "SUSE Bug 1202787 for CVE-2019-9513",
"url": "https://bugzilla.suse.com/1202787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "low"
}
],
"title": "CVE-2019-9513"
},
{
"cve": "CVE-2019-9514",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9514"
}
],
"notes": [
{
"category": "general",
"text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9514",
"url": "https://www.suse.com/security/cve/CVE-2019-9514"
},
{
"category": "external",
"summary": "SUSE Bug 1145662 for CVE-2019-9514",
"url": "https://bugzilla.suse.com/1145662"
},
{
"category": "external",
"summary": "SUSE Bug 1145663 for CVE-2019-9514",
"url": "https://bugzilla.suse.com/1145663"
},
{
"category": "external",
"summary": "SUSE Bug 1146095 for CVE-2019-9514",
"url": "https://bugzilla.suse.com/1146095"
},
{
"category": "external",
"summary": "SUSE Bug 1146115 for CVE-2019-9514",
"url": "https://bugzilla.suse.com/1146115"
},
{
"category": "external",
"summary": "SUSE Bug 1147142 for CVE-2019-9514",
"url": "https://bugzilla.suse.com/1147142"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-9514"
},
{
"cve": "CVE-2019-9515",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9515"
}
],
"notes": [
{
"category": "general",
"text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9515",
"url": "https://www.suse.com/security/cve/CVE-2019-9515"
},
{
"category": "external",
"summary": "SUSE Bug 1145663 for CVE-2019-9515",
"url": "https://bugzilla.suse.com/1145663"
},
{
"category": "external",
"summary": "SUSE Bug 1146100 for CVE-2019-9515",
"url": "https://bugzilla.suse.com/1146100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-17T17:07:38Z",
"details": "important"
}
],
"title": "CVE-2019-9515"
},
{
"cve": "CVE-2019-9516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9516"
}
],
"notes": [
{
"category": "general",
"text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9516",
"url": "https://www.suse.com/security/cve/CVE-2019-9516"
},
{
"category": "external",
"summary": "SUSE Bug 1145582 for CVE-2019-9516",
"url": "https://bugzilla.suse.com/1145582"
},
{
"category": "external",
"summary": "SUSE Bug 1146090 for CVE-2019-9516",
"url": "https://bugzilla.suse.com/1146090"
},
{
"category": "external",
"summary": "SUSE Bug 1193427 for CVE-2019-9516",
"url": "https://bugzilla.suse.com/1193427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64",
"SUSE Linux Ente