Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-15903
Vulnerability from cvelistv5
Published
2019-09-04 05:59
Modified
2024-08-05 01:03
Severity ?
EPSS score ?
Summary
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-4132-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4132-1/" }, { "name": "20190917 [slackware-security] expat (SSA:2019-259-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/30" }, { "name": "USN-4132-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4132-2/" }, { "name": "FEDORA-2019-613edfe68b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/" }, { "name": "DSA-4530", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4530" }, { "name": "20190923 [SECURITY] [DSA 4530-1] expat security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/37" }, { "name": "FEDORA-2019-9505c6b555", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/" }, { "name": "openSUSE-SU-2019:2205", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html" }, { "name": "openSUSE-SU-2019:2204", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html" }, { "name": "FEDORA-2019-672ae0f060", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/" }, { "name": "20191021 [slackware-security] python (SSA:2019-293-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Oct/29" }, { "name": "USN-4165-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4165-1/" }, { "name": "DSA-4549", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4549" }, { "name": "RHSA-2019:3210", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3210" }, { "name": "RHSA-2019:3237", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3237" }, { "name": "20191101 [SECURITY] [DSA 4549-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Nov/1" }, { "name": "openSUSE-SU-2019:2420", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" }, { "name": "openSUSE-SU-2019:2424", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" }, { "name": "openSUSE-SU-2019:2425", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" }, { "name": "RHSA-2019:3756", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3756" }, { "name": "openSUSE-SU-2019:2447", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" }, { "name": "openSUSE-SU-2019:2451", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" }, { "name": "openSUSE-SU-2019:2452", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" }, { "name": "openSUSE-SU-2019:2459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" }, { "name": "openSUSE-SU-2019:2464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" }, { "name": "[debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html" }, { "name": "20191118 [SECURITY] [DSA 4571-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Nov/24" }, { "name": "DSA-4571", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4571" }, { "name": "[debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html" }, { "name": "GLSA-201911-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201911-08" }, { "name": "USN-4202-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4202-1/" }, { "name": "20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/17" }, { "name": "20191211 APPLE-SA-2019-12-10-5 tvOS 13.3", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/21" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "name": "20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/30" }, { "name": "20191213 APPLE-SA-2019-12-10-5 tvOS 13.3", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/27" }, { "name": "openSUSE-SU-2020:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" }, { "name": "openSUSE-SU-2020:0086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4335-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/libexpat/libexpat/issues/317" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/libexpat/libexpat/pull/318" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/libexpat/libexpat/issues/342" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190926-0004/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210788" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210790" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210785" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210789" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210793" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210795" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210794" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2021-11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-15T22:06:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-4132-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4132-1/" }, { "name": "20190917 [slackware-security] expat (SSA:2019-259-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Sep/30" }, { "name": "USN-4132-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4132-2/" }, { "name": "FEDORA-2019-613edfe68b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/" }, { "name": "DSA-4530", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4530" }, { "name": "20190923 [SECURITY] [DSA 4530-1] expat security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Sep/37" }, { "name": "FEDORA-2019-9505c6b555", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/" }, { "name": "openSUSE-SU-2019:2205", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html" }, { "name": "openSUSE-SU-2019:2204", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html" }, { "name": "FEDORA-2019-672ae0f060", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/" }, { "name": "20191021 [slackware-security] python (SSA:2019-293-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Oct/29" }, { "name": "USN-4165-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4165-1/" }, { "name": "DSA-4549", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4549" }, { "name": "RHSA-2019:3210", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3210" }, { "name": "RHSA-2019:3237", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3237" }, { "name": "20191101 [SECURITY] [DSA 4549-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Nov/1" }, { "name": "openSUSE-SU-2019:2420", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" }, { "name": "openSUSE-SU-2019:2424", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" }, { "name": "openSUSE-SU-2019:2425", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" }, { "name": "RHSA-2019:3756", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3756" }, { "name": "openSUSE-SU-2019:2447", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" }, { "name": "openSUSE-SU-2019:2451", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" }, { "name": "openSUSE-SU-2019:2452", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" }, { "name": "openSUSE-SU-2019:2459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" }, { "name": "openSUSE-SU-2019:2464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" }, { "name": "[debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html" }, { "name": "20191118 [SECURITY] [DSA 4571-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Nov/24" }, { "name": "DSA-4571", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4571" }, { "name": "[debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html" }, { "name": "GLSA-201911-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201911-08" }, { "name": "USN-4202-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4202-1/" }, { "name": "20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/17" }, { "name": "20191211 APPLE-SA-2019-12-10-5 tvOS 13.3", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/21" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "name": "20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/30" }, { "name": "20191213 APPLE-SA-2019-12-10-5 tvOS 13.3", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Dec/27" }, { "name": "openSUSE-SU-2020:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" }, { "name": "openSUSE-SU-2020:0086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { "name": "USN-4335-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4335-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/libexpat/libexpat/issues/317" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/libexpat/libexpat/pull/318" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/libexpat/libexpat/issues/342" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190926-0004/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210788" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210790" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210785" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210789" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210793" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210795" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210794" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2021-11" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15903", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-4132-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4132-1/" }, { "name": "20190917 [slackware-security] expat (SSA:2019-259-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/30" }, { "name": "USN-4132-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4132-2/" }, { "name": "FEDORA-2019-613edfe68b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/" }, { "name": "DSA-4530", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4530" }, { "name": "20190923 [SECURITY] [DSA 4530-1] expat security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/37" }, { "name": "FEDORA-2019-9505c6b555", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/" }, { "name": "openSUSE-SU-2019:2205", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html" }, { "name": "openSUSE-SU-2019:2204", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html" }, { "name": "FEDORA-2019-672ae0f060", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/" }, { "name": "20191021 [slackware-security] python (SSA:2019-293-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Oct/29" }, { "name": "USN-4165-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4165-1/" }, { "name": "DSA-4549", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4549" }, { "name": "RHSA-2019:3210", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3210" }, { "name": "RHSA-2019:3237", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3237" }, { "name": "20191101 [SECURITY] [DSA 4549-1] firefox-esr security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Nov/1" }, { "name": "openSUSE-SU-2019:2420", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" }, { "name": "openSUSE-SU-2019:2424", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" }, { "name": "openSUSE-SU-2019:2425", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" }, { "name": "RHSA-2019:3756", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3756" }, { "name": "openSUSE-SU-2019:2447", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" }, { "name": "openSUSE-SU-2019:2451", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" }, { "name": "openSUSE-SU-2019:2452", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" }, { "name": "openSUSE-SU-2019:2459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" }, { "name": "openSUSE-SU-2019:2464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" }, { "name": "[debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html" }, { "name": "20191118 [SECURITY] [DSA 4571-1] thunderbird security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Nov/24" }, { "name": "DSA-4571", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4571" }, { "name": "[debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html" }, { "name": "GLSA-201911-08", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201911-08" }, { "name": "USN-4202-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4202-1/" }, { "name": "20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/17" }, { "name": "20191211 APPLE-SA-2019-12-10-5 tvOS 13.3", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/21" }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Dec/23" }, { "name": "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, { "name": "20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Dec/30" }, { "name": "20191213 APPLE-SA-2019-12-10-5 tvOS 13.3", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Dec/27" }, { "name": "openSUSE-SU-2020:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" }, { "name": "openSUSE-SU-2020:0086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { "name": "USN-4335-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4335-1/" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://github.com/libexpat/libexpat/issues/317", "refsource": "MISC", "url": "https://github.com/libexpat/libexpat/issues/317" }, { "name": "https://github.com/libexpat/libexpat/pull/318", "refsource": "MISC", "url": "https://github.com/libexpat/libexpat/pull/318" }, { "name": "https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43", "refsource": "MISC", "url": "https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43" }, { "name": "https://github.com/libexpat/libexpat/issues/342", "refsource": "CONFIRM", "url": "https://github.com/libexpat/libexpat/issues/342" }, { "name": "http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190926-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190926-0004/" }, { "name": "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html" }, { "name": "http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html" }, { "name": "https://support.apple.com/kb/HT210788", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210788" }, { "name": "https://support.apple.com/kb/HT210790", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210790" }, { "name": "https://support.apple.com/kb/HT210785", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210785" }, { "name": "https://support.apple.com/kb/HT210789", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210789" }, { "name": "https://support.apple.com/kb/HT210793", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210793" }, { "name": "https://support.apple.com/kb/HT210795", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210795" }, { "name": "https://support.apple.com/kb/HT210794", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210794" }, { "name": "https://www.tenable.com/security/tns-2021-11", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-11" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15903", "datePublished": "2019-09-04T05:59:16", "dateReserved": "2019-09-04T00:00:00", "dateUpdated": "2024-08-05T01:03:32.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-15903\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-09-04T06:15:10.877\",\"lastModified\":\"2024-11-21T04:29:42.210\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.\"},{\"lang\":\"es\",\"value\":\"En libexpat versiones anteriores a 2.2.8, una entrada XML especialmente dise\u00f1ada podr\u00eda enga\u00f1ar al analizador para que cambie de an\u00e1lisis DTD a an\u00e1lisis de documentos demasiado pronto; una llamada consecutiva a la funci\u00f3n XML_GetCurrentLineNumber (o XML_GetCurrentColumnNumber) luego result\u00f3 en una lectura excesiva del b\u00fafer en la regi\u00f3n heap de la memoria.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"},{\"lang\":\"en\",\"value\":\"CWE-776\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.8\",\"matchCriteriaId\":\"53820561-496E-490D-8061-A21C9C69C208\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndExcluding\":\"2.7.17\",\"matchCriteriaId\":\"B09B31A2-30BF-4E95-81A3-F77FD97DF5B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.0\",\"versionEndExcluding\":\"3.5.8\",\"matchCriteriaId\":\"9A384586-B574-4240-8BCF-CCE69498F336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.6.0\",\"versionEndExcluding\":\"3.6.10\",\"matchCriteriaId\":\"DD0A51C5-9774-4CB3-A4ED-7C68AF2EFA73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.7.0\",\"versionEndExcluding\":\"3.7.5\",\"matchCriteriaId\":\"26CE919D-4E17-44A1-97FD-0DD55B14701F\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Dec/23\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Dec/26\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Dec/27\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Dec/30\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3210\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3237\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3756\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/libexpat/libexpat/issues/317\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/libexpat/libexpat/issues/342\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/libexpat/libexpat/pull/318\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/17\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/21\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/23\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Nov/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Nov/24\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Oct/29\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/30\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/37\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201911-08\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190926-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210785\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210788\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210789\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210790\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210793\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210794\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210795\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4132-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4132-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4165-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4202-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4335-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4530\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4571\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-11\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Dec/23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Dec/26\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Dec/27\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Dec/30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3756\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/libexpat/libexpat/issues/317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/libexpat/libexpat/issues/342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/libexpat/libexpat/pull/318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Nov/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Nov/24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Oct/29\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/37\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201911-08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190926-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210785\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210788\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210789\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210793\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT210795\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4132-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4132-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4165-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4202-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4335-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4571\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2020:4484
Vulnerability from csaf_redhat
Published
2020-11-04 02:11
Modified
2025-01-09 05:53
Summary
Red Hat Security Advisory: expat security update
Notes
Topic
An update for expat is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for expat is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Expat is a C library for parsing XML documents.\n\nSecurity Fix(es):\n\n* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)\n\n* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4484", "url": "https://access.redhat.com/errata/RHSA-2020:4484" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/" }, { "category": "external", "summary": "1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4484.json" } ], "title": "Red Hat Security Advisory: expat security update", "tracking": { "current_release_date": "2025-01-09T05:53:26+00:00", "generator": { "date": "2025-01-09T05:53:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2020:4484", "initial_release_date": "2020-11-04T02:11:04+00:00", "revision_history": [ { "date": "2020-11-04T02:11:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-04T02:11:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T05:53:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.i686", "product": { "name": "expat-0:2.2.5-4.el8.i686", "product_id": "expat-0:2.2.5-4.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=i686" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.i686", "product": { "name": "expat-devel-0:2.2.5-4.el8.i686", "product_id": "expat-devel-0:2.2.5-4.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=i686" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.i686", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.i686", "product_id": "expat-debugsource-0:2.2.5-4.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=i686" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.i686", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.i686", "product_id": "expat-debuginfo-0:2.2.5-4.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.x86_64", "product": { "name": "expat-0:2.2.5-4.el8.x86_64", "product_id": "expat-0:2.2.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.x86_64", "product": { "name": "expat-devel-0:2.2.5-4.el8.x86_64", "product_id": "expat-devel-0:2.2.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.x86_64", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.x86_64", "product_id": "expat-debugsource-0:2.2.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.x86_64", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.x86_64", "product_id": "expat-debuginfo-0:2.2.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.ppc64le", "product": { "name": "expat-0:2.2.5-4.el8.ppc64le", "product_id": "expat-0:2.2.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.ppc64le", "product": { "name": "expat-devel-0:2.2.5-4.el8.ppc64le", "product_id": "expat-devel-0:2.2.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.ppc64le", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.ppc64le", "product_id": "expat-debugsource-0:2.2.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.ppc64le", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.ppc64le", "product_id": "expat-debuginfo-0:2.2.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.s390x", "product": { "name": "expat-0:2.2.5-4.el8.s390x", "product_id": "expat-0:2.2.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.s390x", "product": { "name": "expat-devel-0:2.2.5-4.el8.s390x", "product_id": "expat-devel-0:2.2.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.s390x", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.s390x", "product_id": "expat-debugsource-0:2.2.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.s390x", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.s390x", "product_id": "expat-debuginfo-0:2.2.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.aarch64", "product": { "name": "expat-0:2.2.5-4.el8.aarch64", "product_id": "expat-0:2.2.5-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.aarch64", "product": { "name": "expat-devel-0:2.2.5-4.el8.aarch64", "product_id": "expat-devel-0:2.2.5-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.aarch64", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.aarch64", "product_id": "expat-debugsource-0:2.2.5-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.aarch64", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.aarch64", "product_id": "expat-debuginfo-0:2.2.5-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.src", "product": { "name": "expat-0:2.2.5-4.el8.src", "product_id": "expat-0:2.2.5-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64" }, "product_reference": "expat-0:2.2.5-4.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686" }, "product_reference": "expat-0:2.2.5-4.el8.i686", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le" }, "product_reference": "expat-0:2.2.5-4.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x" }, "product_reference": "expat-0:2.2.5-4.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src" }, "product_reference": "expat-0:2.2.5-4.el8.src", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64" }, "product_reference": "expat-0:2.2.5-4.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.i686", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.i686", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64" }, "product_reference": "expat-devel-0:2.2.5-4.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686" }, "product_reference": "expat-devel-0:2.2.5-4.el8.i686", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le" }, "product_reference": "expat-devel-0:2.2.5-4.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x" }, "product_reference": "expat-devel-0:2.2.5-4.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" }, "product_reference": "expat-devel-0:2.2.5-4.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1723723" } ], "notes": [ { "category": "description", "text": "It was discovered that the \"setElementTypePrefix()\" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "When processing a specially crafted XML file, expat may use more memory than ultimately necessary, which can also lead to increased CPU usage and longer processing times. Depending on available system resources and configuration, this may also lead to the application triggering the Out-Of-Memory-Killer, causing the application to be terminated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20843" }, { "category": "external", "summary": "RHBZ#1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843" }, { "category": "external", "summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031" } ], "release_date": "2019-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T02:11:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4484" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752592" } ], "notes": [ { "category": "description", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: heap-based buffer over-read via crafted XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "RHBZ#1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T02:11:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4484" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "expat: heap-based buffer over-read via crafted XML input" } ] }
rhsa-2019_3193
Vulnerability from csaf_redhat
Published
2019-10-24 21:33
Modified
2024-11-22 13:54
Summary
Red Hat Security Advisory: firefox security update
Notes
Topic
An update for firefox is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 68.2.0 ESR.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764)
* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757)
* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758)
* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759)
* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760)
* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761)
* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762)
* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 68.2.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764)\n\n* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757)\n\n* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758)\n\n* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759)\n\n* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760)\n\n* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761)\n\n* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762)\n\n* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3193", "url": "https://access.redhat.com/errata/RHSA-2019:3193" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1764438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764438" }, { "category": "external", "summary": "1764439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764439" }, { "category": "external", "summary": "1764440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764440" }, { "category": "external", "summary": "1764441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764441" }, { "category": "external", "summary": "1764442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764442" }, { "category": "external", "summary": "1764443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764443" }, { "category": "external", "summary": "1764444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764444" }, { "category": "external", "summary": "1764446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764446" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3193.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T13:54:38+00:00", "generator": { "date": "2024-11-22T13:54:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3193", "initial_release_date": "2019-10-24T21:33:00+00:00", "revision_history": [ { "date": "2019-10-24T21:33:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-24T21:33:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:54:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.x86_64", "product": { "name": "firefox-0:68.2.0-1.el7_7.x86_64", "product_id": "firefox-0:68.2.0-1.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.src", "product": { "name": "firefox-0:68.2.0-1.el7_7.src", "product_id": "firefox-0:68.2.0-1.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.i686", "product": { "name": "firefox-0:68.2.0-1.el7_7.i686", "product_id": "firefox-0:68.2.0-1.el7_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=i686" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.s390x", "product": { "name": "firefox-0:68.2.0-1.el7_7.s390x", "product_id": "firefox-0:68.2.0-1.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.ppc64", "product": { "name": "firefox-0:68.2.0-1.el7_7.ppc64", "product_id": "firefox-0:68.2.0-1.el7_7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=ppc64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.ppc64le", "product": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le", "product_id": "firefox-0:68.2.0-1.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Zhanjia Song" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11757", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764438" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in Mozilla Firefox and Thunderbird. When following a value\u0027s prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. An attacker could use this flaw to execute code that was stored in the referenced memory or crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free when creating index updates in IndexedDB", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11757" }, { "category": "external", "summary": "RHBZ#1764438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764438" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11757", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11757" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11757", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11757" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Use-after-free when creating index updates in IndexedDB" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Mozilla developers and community" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11758", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764439" } ], "notes": [ { "category": "description", "text": "A flaw was found in the 360 Total Security code in Firefox and Thunderbird. Memory corruption is possible in the accessibility engine that could lead to an exploit to run arbitrary code. This vulnerability could be exploited over a network connection and would affect confidentiality and integrity of information as well as availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Potentially exploitable crash due to 360 Total Security", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11758" }, { "category": "external", "summary": "RHBZ#1764439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764439" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11758", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11758" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11758", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11758" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Potentially exploitable crash due to 360 Total Security" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11759", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764440" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in both Firefox and Thunderbird where 4 bytes of a HMAC output could be written past the end of a buffer stored on the memory stack. This could allow an attacker to execute arbitrary code or lead to a crash. This flaw can be exploited over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Stack buffer overflow in HKDF output", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11759" }, { "category": "external", "summary": "RHBZ#1764440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764440" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11759", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11759" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11759", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11759" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11759", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11759" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Stack buffer overflow in HKDF output" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Nils" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11760", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764441" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in Mozilla Firefox and Thunderbird where a fixed-stack buffer overflow could occur during WebRTC signalling. The vulnerability could lead to an exploitable crash or leak data.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Stack buffer overflow in WebRTC networking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11760" }, { "category": "external", "summary": "RHBZ#1764441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11760", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11760" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11760", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11760" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11760", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11760" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Stack buffer overflow in WebRTC networking" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Cody Crews" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11761", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764442" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Mozilla Firefox and Thunderbird. Privileged JSONView objects that have been cloned into content can be accessed using a form with a data URI. This flaw bypasses existing defense-in-depth mechanisms and can be exploited over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Unintended access to a privileged JSONView object", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11761" }, { "category": "external", "summary": "RHBZ#1764442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11761", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11761" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11761", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11761" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Unintended access to a privileged JSONView object" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Kris Maglione" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11762", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764443" } ], "notes": [ { "category": "description", "text": "A flaw was found in Mozilla\u0027s firefox and thunderbird where if two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This could cause an interaction between two different sites on two different windows running under the same application.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: document.domain-based origin isolation has same-origin-property violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11762" }, { "category": "external", "summary": "RHBZ#1764443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764443" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11762", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11762" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11762", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11762" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: document.domain-based origin isolation has same-origin-property violation" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Gareth Heyes" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11763", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764444" } ], "notes": [ { "category": "description", "text": "A flaw was found in Mozilla Firefox and Thunderbird where null bytes were incorrectly parsed in HTML entities. This could lead to HTML comments being treated as code which could lead to XSS in a web application or HTML entities being masked from filters.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Incorrect HTML parsing results in XSS bypass technique", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11763" }, { "category": "external", "summary": "RHBZ#1764444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11763", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11763" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11763", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11763" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11763", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11763" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Incorrect HTML parsing results in XSS bypass technique" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Aaron Klotz", "Jason Kratzer", "Steve Fink", "Tyson Smith", "Bob Clary", "Byron Campen", "Christian Holler", "Cristian Brindusan", "Honza Bambas", "Iain Ireland" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11764", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764446" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11764" }, { "category": "external", "summary": "RHBZ#1764446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11764", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11764" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11764", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11764" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752592" } ], "notes": [ { "category": "description", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: heap-based buffer over-read via crafted XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "RHBZ#1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "expat: heap-based buffer over-read via crafted XML input" } ] }
RHSA-2020:2644
Vulnerability from csaf_redhat
Published
2020-06-22 12:28
Modified
2025-01-09 05:57
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update
Notes
Topic
Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security fix(es):
* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* libxml2: There's a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)
* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)
* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)\n* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)\n* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n* libxml2: There\u0027s a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)\n* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)\n* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)\n* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)\n* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2644", "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "1788856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788856" }, { "category": "external", "summary": "1799734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799734" }, { "category": "external", "summary": "1799786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786" }, { "category": "external", "summary": "1820772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820772" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "JBCS-941", "url": "https://issues.redhat.com/browse/JBCS-941" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2644.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update", "tracking": { "current_release_date": "2025-01-09T05:57:30+00:00", "generator": { "date": "2025-01-09T05:57:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2020:2644", "initial_release_date": "2020-06-22T12:28:02+00:00", "revision_history": [ { "date": "2020-06-22T12:28:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-22T12:28:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T05:57:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el6" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-25.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-25.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-57.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-57.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-3.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-4.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-4.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-4.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-24.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-51.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-4.Final_redhat_2.jbcs.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-25.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-25.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-57.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-57.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-3.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-4.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-4.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-4.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-24.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-51.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-4.Final_redhat_2.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-25.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-25.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-57.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-57.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-4.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-4.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-4.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-24.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-51.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-4.Final_redhat_2.jbcs.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-4.redhat_1.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-7.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-4.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-57.jbcs.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-57.jbcs.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1723723" } ], "notes": [ { "category": "description", "text": "It was discovered that the \"setElementTypePrefix()\" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "When processing a specially crafted XML file, expat may use more memory than ultimately necessary, which can also lead to increased CPU usage and longer processing times. Depending on available system resources and configuration, this may also lead to the application triggering the Out-Of-Memory-Killer, causing the application to be terminated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20843" }, { "category": "external", "summary": "RHBZ#1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843" }, { "category": "external", "summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031" } ], "release_date": "2019-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS" }, { "cve": "CVE-2019-0196", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695030" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: read-after-free on a string compare", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0196" }, { "category": "external", "summary": "RHBZ#1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0196", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: read-after-free on a string compare" }, { "cve": "CVE-2019-0197", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695042" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: possible crash on late upgrade", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0197" }, { "category": "external", "summary": "RHBZ#1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0197", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: possible crash on late upgrade" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752592" } ], "notes": [ { "category": "description", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: heap-based buffer over-read via crafted XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "RHBZ#1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "expat: heap-based buffer over-read via crafted XML input" }, { "cve": "CVE-2019-19956", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788856" } ], "notes": [ { "category": "description", "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19956" }, { "category": "external", "summary": "RHBZ#1788856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19956", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956" } ], "release_date": "2020-01-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c" }, { "cve": "CVE-2019-20388", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1799734" } ], "notes": [ { "category": "description", "text": "A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. System availability is the highest threat from this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20388" }, { "category": "external", "summary": "RHBZ#1799734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20388", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388" } ], "release_date": "2020-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c" }, { "cve": "CVE-2020-1934", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2020-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1820772" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache\u0027s HTTP server (httpd) .The mod_proxy_ftp module may use uninitialized memory with proxying to a malicious FTP server. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ftp use of uninitialized value", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is caused by use of an uninitialized memory variable. Practically this has no impact, but in some corner cases it is possible that the contents of this variable could be read by a remote process, causing loss of confidentiality as a result of this. There is no evidence of code execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1934" }, { "category": "external", "summary": "RHBZ#1820772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1934", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1934" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2020-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy_ftp use of uninitialized value" }, { "cve": "CVE-2020-7595", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1799786" } ], "notes": [ { "category": "description", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7595" }, { "category": "external", "summary": "RHBZ#1799786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7595", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595" } ], "release_date": "2020-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
RHSA-2019:3193
Vulnerability from csaf_redhat
Published
2019-10-24 21:33
Modified
2025-01-09 05:47
Summary
Red Hat Security Advisory: firefox security update
Notes
Topic
An update for firefox is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 68.2.0 ESR.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764)
* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757)
* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758)
* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759)
* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760)
* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761)
* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762)
* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 68.2.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764)\n\n* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757)\n\n* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758)\n\n* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759)\n\n* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760)\n\n* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761)\n\n* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762)\n\n* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3193", "url": "https://access.redhat.com/errata/RHSA-2019:3193" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1764438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764438" }, { "category": "external", "summary": "1764439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764439" }, { "category": "external", "summary": "1764440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764440" }, { "category": "external", "summary": "1764441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764441" }, { "category": "external", "summary": "1764442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764442" }, { "category": "external", "summary": "1764443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764443" }, { "category": "external", "summary": "1764444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764444" }, { "category": "external", "summary": "1764446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764446" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3193.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2025-01-09T05:47:48+00:00", "generator": { "date": "2025-01-09T05:47:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2019:3193", "initial_release_date": "2019-10-24T21:33:00+00:00", "revision_history": [ { "date": "2019-10-24T21:33:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-24T21:33:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T05:47:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.x86_64", "product": { "name": "firefox-0:68.2.0-1.el7_7.x86_64", "product_id": "firefox-0:68.2.0-1.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.src", "product": { "name": "firefox-0:68.2.0-1.el7_7.src", "product_id": "firefox-0:68.2.0-1.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.i686", "product": { "name": "firefox-0:68.2.0-1.el7_7.i686", "product_id": "firefox-0:68.2.0-1.el7_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=i686" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.s390x", "product": { "name": "firefox-0:68.2.0-1.el7_7.s390x", "product_id": "firefox-0:68.2.0-1.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.ppc64", "product": { "name": "firefox-0:68.2.0-1.el7_7.ppc64", "product_id": "firefox-0:68.2.0-1.el7_7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=ppc64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:68.2.0-1.el7_7.ppc64le", "product": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le", "product_id": "firefox-0:68.2.0-1.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@68.2.0-1.el7_7?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "product": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "product_id": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@68.2.0-1.el7_7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Client-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Client-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Workstation-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src" }, "product_reference": "firefox-0:68.2.0-1.el7_7.src", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.i686", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" }, "product_reference": "firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Zhanjia Song" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11757", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764438" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in Mozilla Firefox and Thunderbird. When following a value\u0027s prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. An attacker could use this flaw to execute code that was stored in the referenced memory or crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free when creating index updates in IndexedDB", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11757" }, { "category": "external", "summary": "RHBZ#1764438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764438" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11757", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11757" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11757", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11757" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Use-after-free when creating index updates in IndexedDB" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Mozilla developers and community" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11758", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764439" } ], "notes": [ { "category": "description", "text": "A flaw was found in the 360 Total Security code in Firefox and Thunderbird. Memory corruption is possible in the accessibility engine that could lead to an exploit to run arbitrary code. This vulnerability could be exploited over a network connection and would affect confidentiality and integrity of information as well as availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Potentially exploitable crash due to 360 Total Security", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11758" }, { "category": "external", "summary": "RHBZ#1764439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764439" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11758", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11758" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11758", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11758" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Potentially exploitable crash due to 360 Total Security" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11759", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764440" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in both Firefox and Thunderbird where 4 bytes of a HMAC output could be written past the end of a buffer stored on the memory stack. This could allow an attacker to execute arbitrary code or lead to a crash. This flaw can be exploited over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Stack buffer overflow in HKDF output", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11759" }, { "category": "external", "summary": "RHBZ#1764440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764440" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11759", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11759" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11759", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11759" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11759", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11759" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Stack buffer overflow in HKDF output" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Nils" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11760", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764441" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in Mozilla Firefox and Thunderbird where a fixed-stack buffer overflow could occur during WebRTC signalling. The vulnerability could lead to an exploitable crash or leak data.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Stack buffer overflow in WebRTC networking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11760" }, { "category": "external", "summary": "RHBZ#1764441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11760", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11760" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11760", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11760" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11760", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11760" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Stack buffer overflow in WebRTC networking" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Cody Crews" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11761", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764442" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Mozilla Firefox and Thunderbird. Privileged JSONView objects that have been cloned into content can be accessed using a form with a data URI. This flaw bypasses existing defense-in-depth mechanisms and can be exploited over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Unintended access to a privileged JSONView object", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11761" }, { "category": "external", "summary": "RHBZ#1764442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11761", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11761" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11761", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11761" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Unintended access to a privileged JSONView object" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Kris Maglione" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11762", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764443" } ], "notes": [ { "category": "description", "text": "A flaw was found in Mozilla\u0027s firefox and thunderbird where if two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This could cause an interaction between two different sites on two different windows running under the same application.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: document.domain-based origin isolation has same-origin-property violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11762" }, { "category": "external", "summary": "RHBZ#1764443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764443" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11762", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11762" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11762", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11762" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: document.domain-based origin isolation has same-origin-property violation" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Gareth Heyes" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11763", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764444" } ], "notes": [ { "category": "description", "text": "A flaw was found in Mozilla Firefox and Thunderbird where null bytes were incorrectly parsed in HTML entities. This could lead to HTML comments being treated as code which could lead to XSS in a web application or HTML entities being masked from filters.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Incorrect HTML parsing results in XSS bypass technique", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11763" }, { "category": "external", "summary": "RHBZ#1764444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11763", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11763" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11763", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11763" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11763", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11763" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Incorrect HTML parsing results in XSS bypass technique" }, { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Aaron Klotz", "Jason Kratzer", "Steve Fink", "Tyson Smith", "Bob Clary", "Byron Campen", "Christian Holler", "Cristian Brindusan", "Honza Bambas", "Iain Ireland" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-11764", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764446" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11764" }, { "category": "external", "summary": "RHBZ#1764446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11764", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11764" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11764", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11764" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752592" } ], "notes": [ { "category": "description", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: heap-based buffer over-read via crafted XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "RHBZ#1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:33:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3193" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Client-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Client-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Server-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Server-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.src", "7Workstation-optional-7.7.Z:firefox-0:68.2.0-1.el7_7.x86_64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.i686", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.ppc64le", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.s390x", "7Workstation-optional-7.7.Z:firefox-debuginfo-0:68.2.0-1.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "expat: heap-based buffer over-read via crafted XML input" } ] }
RHSA-2020:4484
Vulnerability from csaf_redhat
Published
2020-11-04 02:11
Modified
2025-01-09 05:53
Summary
Red Hat Security Advisory: expat security update
Notes
Topic
An update for expat is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for expat is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Expat is a C library for parsing XML documents.\n\nSecurity Fix(es):\n\n* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)\n\n* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4484", "url": "https://access.redhat.com/errata/RHSA-2020:4484" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/" }, { "category": "external", "summary": "1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4484.json" } ], "title": "Red Hat Security Advisory: expat security update", "tracking": { "current_release_date": "2025-01-09T05:53:26+00:00", "generator": { "date": "2025-01-09T05:53:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2020:4484", "initial_release_date": "2020-11-04T02:11:04+00:00", "revision_history": [ { "date": "2020-11-04T02:11:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-04T02:11:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-09T05:53:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.i686", "product": { "name": "expat-0:2.2.5-4.el8.i686", "product_id": "expat-0:2.2.5-4.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=i686" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.i686", "product": { "name": "expat-devel-0:2.2.5-4.el8.i686", "product_id": "expat-devel-0:2.2.5-4.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=i686" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.i686", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.i686", "product_id": "expat-debugsource-0:2.2.5-4.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=i686" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.i686", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.i686", "product_id": "expat-debuginfo-0:2.2.5-4.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.x86_64", "product": { "name": "expat-0:2.2.5-4.el8.x86_64", "product_id": "expat-0:2.2.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.x86_64", "product": { "name": "expat-devel-0:2.2.5-4.el8.x86_64", "product_id": "expat-devel-0:2.2.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.x86_64", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.x86_64", "product_id": "expat-debugsource-0:2.2.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.x86_64", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.x86_64", "product_id": "expat-debuginfo-0:2.2.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.ppc64le", "product": { "name": "expat-0:2.2.5-4.el8.ppc64le", "product_id": "expat-0:2.2.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.ppc64le", "product": { "name": "expat-devel-0:2.2.5-4.el8.ppc64le", "product_id": "expat-devel-0:2.2.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.ppc64le", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.ppc64le", "product_id": "expat-debugsource-0:2.2.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.ppc64le", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.ppc64le", "product_id": "expat-debuginfo-0:2.2.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.s390x", "product": { "name": "expat-0:2.2.5-4.el8.s390x", "product_id": "expat-0:2.2.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.s390x", "product": { "name": "expat-devel-0:2.2.5-4.el8.s390x", "product_id": "expat-devel-0:2.2.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.s390x", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.s390x", "product_id": "expat-debugsource-0:2.2.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.s390x", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.s390x", "product_id": "expat-debuginfo-0:2.2.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.aarch64", "product": { "name": "expat-0:2.2.5-4.el8.aarch64", "product_id": "expat-0:2.2.5-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "expat-devel-0:2.2.5-4.el8.aarch64", "product": { "name": "expat-devel-0:2.2.5-4.el8.aarch64", "product_id": "expat-devel-0:2.2.5-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.2.5-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "expat-debugsource-0:2.2.5-4.el8.aarch64", "product": { "name": "expat-debugsource-0:2.2.5-4.el8.aarch64", "product_id": "expat-debugsource-0:2.2.5-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debugsource@2.2.5-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.2.5-4.el8.aarch64", "product": { "name": "expat-debuginfo-0:2.2.5-4.el8.aarch64", "product_id": "expat-debuginfo-0:2.2.5-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.2.5-4.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.2.5-4.el8.src", "product": { "name": "expat-0:2.2.5-4.el8.src", "product_id": "expat-0:2.2.5-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.2.5-4.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64" }, "product_reference": "expat-0:2.2.5-4.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686" }, "product_reference": "expat-0:2.2.5-4.el8.i686", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le" }, "product_reference": "expat-0:2.2.5-4.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x" }, "product_reference": "expat-0:2.2.5-4.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src" }, "product_reference": "expat-0:2.2.5-4.el8.src", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.2.5-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64" }, "product_reference": "expat-0:2.2.5-4.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.i686", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.2.5-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64" }, "product_reference": "expat-debuginfo-0:2.2.5-4.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.i686", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debugsource-0:2.2.5-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64" }, "product_reference": "expat-debugsource-0:2.2.5-4.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64" }, "product_reference": "expat-devel-0:2.2.5-4.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686" }, "product_reference": "expat-devel-0:2.2.5-4.el8.i686", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le" }, "product_reference": "expat-devel-0:2.2.5-4.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x" }, "product_reference": "expat-devel-0:2.2.5-4.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.2.5-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" }, "product_reference": "expat-devel-0:2.2.5-4.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1723723" } ], "notes": [ { "category": "description", "text": "It was discovered that the \"setElementTypePrefix()\" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "When processing a specially crafted XML file, expat may use more memory than ultimately necessary, which can also lead to increased CPU usage and longer processing times. Depending on available system resources and configuration, this may also lead to the application triggering the Out-Of-Memory-Killer, causing the application to be terminated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20843" }, { "category": "external", "summary": "RHBZ#1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843" }, { "category": "external", "summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031" } ], "release_date": "2019-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T02:11:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4484" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752592" } ], "notes": [ { "category": "description", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: heap-based buffer over-read via crafted XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "RHBZ#1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T02:11:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4484" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.src", "BaseOS-8.3.0.GA:expat-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debuginfo-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-debugsource-0:2.2.5-4.el8.x86_64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.aarch64", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.i686", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.ppc64le", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.s390x", "BaseOS-8.3.0.GA:expat-devel-0:2.2.5-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "expat: heap-based buffer over-read via crafted XML input" } ] }
rhsa-2020:2644
Vulnerability from csaf_redhat
Published
2020-06-22 12:28
Modified
2025-01-09 05:57
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update
Notes
Topic
Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security fix(es):
* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* libxml2: There's a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)
* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)
* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.