Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-1000342 (GCVE-0-2016-1000342)
Vulnerability from cvelistv5 – Published: 2018-06-04 13:00 – Updated: 2024-08-06 03:55- n/a
| URL | Tags |
|---|---|
| https://lists.debian.org/debian-lts-announce/2018… | mailing-listx_refsource_MLIST |
| https://access.redhat.com/errata/RHSA-2018:2669 | vendor-advisoryx_refsource_REDHAT |
| https://usn.ubuntu.com/3727-1/ | vendor-advisoryx_refsource_UBUNTU |
| https://access.redhat.com/errata/RHSA-2018:2927 | vendor-advisoryx_refsource_REDHAT |
| https://www.oracle.com/security-alerts/cpuoct2020.html | x_refsource_MISC |
| https://security.netapp.com/advisory/ntap-2018112… | x_refsource_CONFIRM |
| https://github.com/bcgit/bc-java/commit/843c2e60f… | x_refsource_CONFIRM |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T03:55:27.546Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[debian-lts-announce] 20180707 [SECURITY] [DLA 1418-1] bouncycastle security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"name": "RHSA-2018:2669",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name": "USN-3727-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3727-1/"
},
{
"name": "RHSA-2018:2927",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-10-14T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-20T21:14:50.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[debian-lts-announce] 20180707 [SECURITY] [DLA 1418-1] bouncycastle security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"name": "RHSA-2018:2669",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name": "USN-3727-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3727-1/"
},
{
"name": "RHSA-2018:2927",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1000342",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20180707 [SECURITY] [DLA 1418-1] bouncycastle security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"name": "RHSA-2018:2669",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name": "USN-3727-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3727-1/"
},
{
"name": "RHSA-2018:2927",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181127-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
},
{
"name": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-1000342",
"datePublished": "2018-06-04T13:00:00.000Z",
"dateReserved": "2018-06-04T00:00:00.000Z",
"dateUpdated": "2024-08-06T03:55:27.546Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2016-1000342",
"date": "2026-05-19",
"epss": "0.00471",
"percentile": "0.64794"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.55\", \"matchCriteriaId\": \"946393A6-EEE2-4502-9309-81514DB5755B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.\"}, {\"lang\": \"es\", \"value\": \"En Bouncy Castle JCE Provider en versiones 1.55 y anteriores, el ECDSA no valida completamente el cifrado ASN.1 de la firma en verificaci\\u00f3n. Es posible inyectar elementos extra en la secuencia que forma la firma y, a\\u00fan as\\u00ed, validarla. En algunos casos, esto podr\\u00eda permitir la introducci\\u00f3n de datos \\\"invisibles\\\" en una estructura firmada.\"}]",
"id": "CVE-2016-1000342",
"lastModified": "2024-11-21T02:43:03.110",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-06-04T13:29:00.387",
"references": "[{\"url\": \"https://access.redhat.com/errata/RHSA-2018:2669\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2927\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20181127-0004/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://usn.ubuntu.com/3727-1/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpuoct2020.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2669\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2927\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20181127-0004/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/3727-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpuoct2020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-347\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-1000342\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-06-04T13:29:00.387\",\"lastModified\":\"2025-05-12T17:37:16.527\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.\"},{\"lang\":\"es\",\"value\":\"En Bouncy Castle JCE Provider en versiones 1.55 y anteriores, el ECDSA no valida completamente el cifrado ASN.1 de la firma en verificaci\u00f3n. Es posible inyectar elementos extra en la secuencia que forma la firma y, a\u00fan as\u00ed, validarla. En algunos casos, esto podr\u00eda permitir la introducci\u00f3n de datos \\\"invisibles\\\" en una estructura firmada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.55\",\"matchCriteriaId\":\"AE27AE65-72E0-408F-808E-7273F4B9D986\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2669\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2927\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20181127-0004/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3727-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2927\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20181127-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3727-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2020-AVI-420
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Junos Space et Junos Space Security Director versions antérieures à 20.1R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.1R3-EVO,19.2R2-EVO, 19.3R1-EVO, 19.3R3-EVO, 19.4R2-EVO, 19.4R2-S2-EVO, 20.1R1-EVO, 20.1R2-EVO et 20.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S15, 12.3X48-D100, 12.3X48-D95, 14.1X53-D140, 14.1X53-D54, 15.1R7-S6, 15.1R7-S7, 15.1X49-D200, 15.1X49-D210, 15.1X49-D230, 15.1X53-D593, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.1R2-S12, 17.1R3-S2, 17.2R1-S9, 17.2R2-S8, 17.2R3-S3, 17.2R3-S4, 17.2X75-D105.19, 17.3R2-S5, 17.3R3-S6, 17.3R3-S7, 17.3R3-S8, 17.4R1-S3, 17.4R2, 17.4R2-S10, 17.4R2-S11, 17.4R2-S2, 17.4R2-S4, 17.4R2-S8, 17.4R2-S9, 17.4R3, 17.4R3-S1, 17.4R3-S2, 18.1R2, 18.1R3-S10, 18.1R3-S2, 18.1R3-S5, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2X75-D10, 18.2X75-D13, 18.2X75-D32, 18.2X75-D33, 18.2X75-D34, 18.2X75-D40, 18.2X75-D41, 18.2X75-D411.1, 18.2X75-D420, 18.2X75-D420.18, 18.2X75-D430, 18.2X75-D50, 18.2X75-D52, 18.2X75-D52.3, 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60, 18.2X75-D60.2, 18.2X75-D65, 18.2X75-D65.1, 18.2X75-D70, 18.2X75-D70;(*1), 18.3R1-S2, 18.3R1-S7, 18.3R2, 18.3R2-S3, 18.3R2-S4, 18.3R3, 18.3R3-S1, 18.3R3-S2, 18.4R1, 18.4R1-S5, 18.4R1-S6, 18.4R1-S7, 18.4R2, 18.4R2-S4, 18.4R2-S5, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3(*2), 19.1R1-S4, 19.1R1-S5, 19.1R2, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.2R1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R1-S5, 19.2R2, 19.2R3, 19.3R2, 19.3R2-S2, 19.3R2-S3, 19.3R3, 19.4R1, 19.4R1-S1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R3, 20.1R1, 20.1R1-S1, 20.1R1-S2, 20.1R2 et 20.2R1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space et Junos Space Security Director versions ant\u00e9rieures \u00e0 20.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.1R3-EVO,19.2R2-EVO, 19.3R1-EVO, 19.3R3-EVO, 19.4R2-EVO, 19.4R2-S2-EVO, 20.1R1-EVO, 20.1R2-EVO et 20.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S15, 12.3X48-D100, 12.3X48-D95, 14.1X53-D140, 14.1X53-D54, 15.1R7-S6, 15.1R7-S7, 15.1X49-D200, 15.1X49-D210, 15.1X49-D230, 15.1X53-D593, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.1R2-S12, 17.1R3-S2, 17.2R1-S9, 17.2R2-S8, 17.2R3-S3, 17.2R3-S4, 17.2X75-D105.19, 17.3R2-S5, 17.3R3-S6, 17.3R3-S7, 17.3R3-S8, 17.4R1-S3, 17.4R2, 17.4R2-S10, 17.4R2-S11, 17.4R2-S2, 17.4R2-S4, 17.4R2-S8, 17.4R2-S9, 17.4R3, 17.4R3-S1, 17.4R3-S2, 18.1R2, 18.1R3-S10, 18.1R3-S2, 18.1R3-S5, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2X75-D10, 18.2X75-D13, 18.2X75-D32, 18.2X75-D33, 18.2X75-D34, 18.2X75-D40, 18.2X75-D41, 18.2X75-D411.1, 18.2X75-D420, 18.2X75-D420.18, 18.2X75-D430, 18.2X75-D50, 18.2X75-D52, 18.2X75-D52.3, 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60, 18.2X75-D60.2, 18.2X75-D65, 18.2X75-D65.1, 18.2X75-D70, 18.2X75-D70;(*1), 18.3R1-S2, 18.3R1-S7, 18.3R2, 18.3R2-S3, 18.3R2-S4, 18.3R3, 18.3R3-S1, 18.3R3-S2, 18.4R1, 18.4R1-S5, 18.4R1-S6, 18.4R1-S7, 18.4R2, 18.4R2-S4, 18.4R2-S5, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3(*2), 19.1R1-S4, 19.1R1-S5, 19.1R2, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.2R1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R1-S5, 19.2R2, 19.2R3, 19.3R2, 19.3R2-S2, 19.3R2-S3, 19.3R3, 19.4R1, 19.4R1-S1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R3, 20.1R1, 20.1R1-S1, 20.1R1-S2, 20.1R2 et 20.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2016-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2324"
},
{
"name": "CVE-2013-1960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1960"
},
{
"name": "CVE-2012-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4447"
},
{
"name": "CVE-2016-3991",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3991"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2014-7826",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7826"
},
{
"name": "CVE-2020-1648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1648"
},
{
"name": "CVE-2016-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3621"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2016-1000341",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000341"
},
{
"name": "CVE-2016-6662",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6662"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-11097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
},
{
"name": "CVE-2009-2347",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2347"
},
{
"name": "CVE-2014-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3634"
},
{
"name": "CVE-2016-1000343",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000343"
},
{
"name": "CVE-2015-1782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1782"
},
{
"name": "CVE-2017-13098",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13098"
},
{
"name": "CVE-2019-11132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
},
{
"name": "CVE-2014-7825",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7825"
},
{
"name": "CVE-2016-6136",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6136"
},
{
"name": "CVE-2020-1646",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1646"
},
{
"name": "CVE-2019-11086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
},
{
"name": "CVE-2017-7895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7895"
},
{
"name": "CVE-2012-1173",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1173"
},
{
"name": "CVE-2012-2088",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2088"
},
{
"name": "CVE-2014-9938",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9938"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2020-1651",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1651"
},
{
"name": "CVE-2010-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2067"
},
{
"name": "CVE-2019-11106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
},
{
"name": "CVE-2016-1000346",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000346"
},
{
"name": "CVE-2016-3945",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3945"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2020-1645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1645"
},
{
"name": "CVE-2016-1000345",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000345"
},
{
"name": "CVE-2020-1640",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1640"
},
{
"name": "CVE-2013-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4244"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2020-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1643"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2015-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7940"
},
{
"name": "CVE-2017-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000117"
},
{
"name": "CVE-2012-5581",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5581"
},
{
"name": "CVE-2016-1000338",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000338"
},
{
"name": "CVE-2014-3690",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3690"
},
{
"name": "CVE-2018-1000613",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000613"
},
{
"name": "CVE-2017-12588",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12588"
},
{
"name": "CVE-2016-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0787"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-9555",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9555"
},
{
"name": "CVE-2013-1624",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1624"
},
{
"name": "CVE-2016-3990",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3990"
},
{
"name": "CVE-2019-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
},
{
"name": "CVE-2018-1000021",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000021"
},
{
"name": "CVE-2019-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
},
{
"name": "CVE-2014-9679",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9679"
},
{
"name": "CVE-2020-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1647"
},
{
"name": "CVE-2019-11107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
},
{
"name": "CVE-2020-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1652"
},
{
"name": "CVE-2017-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14867"
},
{
"name": "CVE-2009-5022",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5022"
},
{
"name": "CVE-2016-1835",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1835"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2020-1650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1650"
},
{
"name": "CVE-2016-1000342",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000342"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2019-11110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2016-1000339",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000339"
},
{
"name": "CVE-2008-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2327"
},
{
"name": "CVE-2017-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9935"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5382",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5382"
},
{
"name": "CVE-2014-9584",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9584"
},
{
"name": "CVE-2019-11102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
},
{
"name": "CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"name": "CVE-2019-11088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
},
{
"name": "CVE-2019-11105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
},
{
"name": "CVE-2016-5616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5616"
},
{
"name": "CVE-2015-1421",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1421"
},
{
"name": "CVE-2014-9529",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9529"
},
{
"name": "CVE-2020-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1654"
},
{
"name": "CVE-2013-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1961"
},
{
"name": "CVE-2015-7082",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7082"
},
{
"name": "CVE-2006-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2193"
},
{
"name": "CVE-2014-8171",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8171"
},
{
"name": "CVE-2006-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2656"
},
{
"name": "CVE-2019-11101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2018-11233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11233"
},
{
"name": "CVE-2013-4232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4232"
},
{
"name": "CVE-2013-4243",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4243"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2011-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3200"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2017-15298",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15298"
},
{
"name": "CVE-2014-8884",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8884"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2019-11131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
},
{
"name": "CVE-2020-1641",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1641"
},
{
"name": "CVE-2019-11090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
},
{
"name": "CVE-2013-4758",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4758"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2019-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
},
{
"name": "CVE-2019-11109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
},
{
"name": "CVE-2016-5314",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5314"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1000352",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000352"
},
{
"name": "CVE-2010-2065",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2065"
},
{
"name": "CVE-2019-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
},
{
"name": "CVE-2010-1411",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1411"
},
{
"name": "CVE-2016-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3632"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2015-7547",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7547"
},
{
"name": "CVE-2020-1649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1649"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2012-4564",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4564"
},
{
"name": "CVE-2012-2113",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2113"
},
{
"name": "CVE-2019-11104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
},
{
"name": "CVE-2019-11087",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
},
{
"name": "CVE-2016-1000344",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000344"
},
{
"name": "CVE-2019-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
},
{
"name": "CVE-2014-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3215"
},
{
"name": "CVE-2018-11235",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11235"
},
{
"name": "CVE-2016-6663",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6663"
},
{
"name": "CVE-2018-19486",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19486"
},
{
"name": "CVE-2015-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7545"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2019-11100",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
},
{
"name": "CVE-2018-5360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5360"
},
{
"name": "CVE-2018-1000180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000180"
},
{
"name": "CVE-2019-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
},
{
"name": "CVE-2020-1644",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1644"
},
{
"name": "CVE-2019-11147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
},
{
"name": "CVE-2012-3401",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3401"
},
{
"name": "CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"name": "CVE-2014-3683",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3683"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-420",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11038 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11038\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11024 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11024\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11026 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11027 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11027\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11035 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11035\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11023 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11025 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11025\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11034 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11034\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11033 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11033\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11032 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11032\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11036 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11036\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11031 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11031\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11030 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11030\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11037 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11037\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11028 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11028\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2020-AVI-420
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Junos Space et Junos Space Security Director versions antérieures à 20.1R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.1R3-EVO,19.2R2-EVO, 19.3R1-EVO, 19.3R3-EVO, 19.4R2-EVO, 19.4R2-S2-EVO, 20.1R1-EVO, 20.1R2-EVO et 20.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S15, 12.3X48-D100, 12.3X48-D95, 14.1X53-D140, 14.1X53-D54, 15.1R7-S6, 15.1R7-S7, 15.1X49-D200, 15.1X49-D210, 15.1X49-D230, 15.1X53-D593, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.1R2-S12, 17.1R3-S2, 17.2R1-S9, 17.2R2-S8, 17.2R3-S3, 17.2R3-S4, 17.2X75-D105.19, 17.3R2-S5, 17.3R3-S6, 17.3R3-S7, 17.3R3-S8, 17.4R1-S3, 17.4R2, 17.4R2-S10, 17.4R2-S11, 17.4R2-S2, 17.4R2-S4, 17.4R2-S8, 17.4R2-S9, 17.4R3, 17.4R3-S1, 17.4R3-S2, 18.1R2, 18.1R3-S10, 18.1R3-S2, 18.1R3-S5, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2X75-D10, 18.2X75-D13, 18.2X75-D32, 18.2X75-D33, 18.2X75-D34, 18.2X75-D40, 18.2X75-D41, 18.2X75-D411.1, 18.2X75-D420, 18.2X75-D420.18, 18.2X75-D430, 18.2X75-D50, 18.2X75-D52, 18.2X75-D52.3, 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60, 18.2X75-D60.2, 18.2X75-D65, 18.2X75-D65.1, 18.2X75-D70, 18.2X75-D70;(*1), 18.3R1-S2, 18.3R1-S7, 18.3R2, 18.3R2-S3, 18.3R2-S4, 18.3R3, 18.3R3-S1, 18.3R3-S2, 18.4R1, 18.4R1-S5, 18.4R1-S6, 18.4R1-S7, 18.4R2, 18.4R2-S4, 18.4R2-S5, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3(*2), 19.1R1-S4, 19.1R1-S5, 19.1R2, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.2R1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R1-S5, 19.2R2, 19.2R3, 19.3R2, 19.3R2-S2, 19.3R2-S3, 19.3R3, 19.4R1, 19.4R1-S1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R3, 20.1R1, 20.1R1-S1, 20.1R1-S2, 20.1R2 et 20.2R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space et Junos Space Security Director versions ant\u00e9rieures \u00e0 20.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.1R3-EVO,19.2R2-EVO, 19.3R1-EVO, 19.3R3-EVO, 19.4R2-EVO, 19.4R2-S2-EVO, 20.1R1-EVO, 20.1R2-EVO et 20.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S15, 12.3X48-D100, 12.3X48-D95, 14.1X53-D140, 14.1X53-D54, 15.1R7-S6, 15.1R7-S7, 15.1X49-D200, 15.1X49-D210, 15.1X49-D230, 15.1X53-D593, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.1R2-S12, 17.1R3-S2, 17.2R1-S9, 17.2R2-S8, 17.2R3-S3, 17.2R3-S4, 17.2X75-D105.19, 17.3R2-S5, 17.3R3-S6, 17.3R3-S7, 17.3R3-S8, 17.4R1-S3, 17.4R2, 17.4R2-S10, 17.4R2-S11, 17.4R2-S2, 17.4R2-S4, 17.4R2-S8, 17.4R2-S9, 17.4R3, 17.4R3-S1, 17.4R3-S2, 18.1R2, 18.1R3-S10, 18.1R3-S2, 18.1R3-S5, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2X75-D10, 18.2X75-D13, 18.2X75-D32, 18.2X75-D33, 18.2X75-D34, 18.2X75-D40, 18.2X75-D41, 18.2X75-D411.1, 18.2X75-D420, 18.2X75-D420.18, 18.2X75-D430, 18.2X75-D50, 18.2X75-D52, 18.2X75-D52.3, 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60, 18.2X75-D60.2, 18.2X75-D65, 18.2X75-D65.1, 18.2X75-D70, 18.2X75-D70;(*1), 18.3R1-S2, 18.3R1-S7, 18.3R2, 18.3R2-S3, 18.3R2-S4, 18.3R3, 18.3R3-S1, 18.3R3-S2, 18.4R1, 18.4R1-S5, 18.4R1-S6, 18.4R1-S7, 18.4R2, 18.4R2-S4, 18.4R2-S5, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3(*2), 19.1R1-S4, 19.1R1-S5, 19.1R2, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.2R1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R1-S5, 19.2R2, 19.2R3, 19.3R2, 19.3R2-S2, 19.3R2-S3, 19.3R3, 19.4R1, 19.4R1-S1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R3, 20.1R1, 20.1R1-S1, 20.1R1-S2, 20.1R2 et 20.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2016-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2324"
},
{
"name": "CVE-2013-1960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1960"
},
{
"name": "CVE-2012-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4447"
},
{
"name": "CVE-2016-3991",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3991"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2014-7826",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7826"
},
{
"name": "CVE-2020-1648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1648"
},
{
"name": "CVE-2016-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3621"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2016-1000341",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000341"
},
{
"name": "CVE-2016-6662",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6662"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-11097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
},
{
"name": "CVE-2009-2347",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2347"
},
{
"name": "CVE-2014-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3634"
},
{
"name": "CVE-2016-1000343",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000343"
},
{
"name": "CVE-2015-1782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1782"
},
{
"name": "CVE-2017-13098",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13098"
},
{
"name": "CVE-2019-11132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
},
{
"name": "CVE-2014-7825",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7825"
},
{
"name": "CVE-2016-6136",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6136"
},
{
"name": "CVE-2020-1646",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1646"
},
{
"name": "CVE-2019-11086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
},
{
"name": "CVE-2017-7895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7895"
},
{
"name": "CVE-2012-1173",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1173"
},
{
"name": "CVE-2012-2088",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2088"
},
{
"name": "CVE-2014-9938",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9938"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2020-1651",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1651"
},
{
"name": "CVE-2010-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2067"
},
{
"name": "CVE-2019-11106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
},
{
"name": "CVE-2016-1000346",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000346"
},
{
"name": "CVE-2016-3945",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3945"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2020-1645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1645"
},
{
"name": "CVE-2016-1000345",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000345"
},
{
"name": "CVE-2020-1640",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1640"
},
{
"name": "CVE-2013-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4244"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2020-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1643"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2015-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7940"
},
{
"name": "CVE-2017-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000117"
},
{
"name": "CVE-2012-5581",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5581"
},
{
"name": "CVE-2016-1000338",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000338"
},
{
"name": "CVE-2014-3690",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3690"
},
{
"name": "CVE-2018-1000613",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000613"
},
{
"name": "CVE-2017-12588",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12588"
},
{
"name": "CVE-2016-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0787"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-9555",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9555"
},
{
"name": "CVE-2013-1624",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1624"
},
{
"name": "CVE-2016-3990",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3990"
},
{
"name": "CVE-2019-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
},
{
"name": "CVE-2018-1000021",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000021"
},
{
"name": "CVE-2019-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
},
{
"name": "CVE-2014-9679",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9679"
},
{
"name": "CVE-2020-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1647"
},
{
"name": "CVE-2019-11107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
},
{
"name": "CVE-2020-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1652"
},
{
"name": "CVE-2017-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14867"
},
{
"name": "CVE-2009-5022",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5022"
},
{
"name": "CVE-2016-1835",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1835"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2020-1650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1650"
},
{
"name": "CVE-2016-1000342",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000342"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2019-11110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2016-1000339",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000339"
},
{
"name": "CVE-2008-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2327"
},
{
"name": "CVE-2017-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9935"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5382",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5382"
},
{
"name": "CVE-2014-9584",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9584"
},
{
"name": "CVE-2019-11102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
},
{
"name": "CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"name": "CVE-2019-11088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
},
{
"name": "CVE-2019-11105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
},
{
"name": "CVE-2016-5616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5616"
},
{
"name": "CVE-2015-1421",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1421"
},
{
"name": "CVE-2014-9529",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9529"
},
{
"name": "CVE-2020-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1654"
},
{
"name": "CVE-2013-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1961"
},
{
"name": "CVE-2015-7082",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7082"
},
{
"name": "CVE-2006-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2193"
},
{
"name": "CVE-2014-8171",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8171"
},
{
"name": "CVE-2006-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2656"
},
{
"name": "CVE-2019-11101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2018-11233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11233"
},
{
"name": "CVE-2013-4232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4232"
},
{
"name": "CVE-2013-4243",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4243"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2011-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3200"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2017-15298",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15298"
},
{
"name": "CVE-2014-8884",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8884"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2019-11131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
},
{
"name": "CVE-2020-1641",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1641"
},
{
"name": "CVE-2019-11090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
},
{
"name": "CVE-2013-4758",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4758"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2019-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
},
{
"name": "CVE-2019-11109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
},
{
"name": "CVE-2016-5314",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5314"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1000352",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000352"
},
{
"name": "CVE-2010-2065",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2065"
},
{
"name": "CVE-2019-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
},
{
"name": "CVE-2010-1411",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1411"
},
{
"name": "CVE-2016-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3632"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2015-7547",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7547"
},
{
"name": "CVE-2020-1649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1649"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2012-4564",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4564"
},
{
"name": "CVE-2012-2113",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2113"
},
{
"name": "CVE-2019-11104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
},
{
"name": "CVE-2019-11087",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
},
{
"name": "CVE-2016-1000344",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000344"
},
{
"name": "CVE-2019-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
},
{
"name": "CVE-2014-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3215"
},
{
"name": "CVE-2018-11235",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11235"
},
{
"name": "CVE-2016-6663",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6663"
},
{
"name": "CVE-2018-19486",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19486"
},
{
"name": "CVE-2015-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7545"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2019-11100",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
},
{
"name": "CVE-2018-5360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5360"
},
{
"name": "CVE-2018-1000180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000180"
},
{
"name": "CVE-2019-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
},
{
"name": "CVE-2020-1644",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1644"
},
{
"name": "CVE-2019-11147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
},
{
"name": "CVE-2012-3401",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3401"
},
{
"name": "CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"name": "CVE-2014-3683",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3683"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-420",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11038 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11038\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11024 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11024\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11026 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11027 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11027\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11035 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11035\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11023 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11025 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11025\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11034 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11034\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11033 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11033\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11032 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11032\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11036 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11036\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11031 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11031\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11030 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11030\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11037 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11037\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11028 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11028\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2026-AVI-0292
Vulnerability from certfr_avis - Published: 2026-03-13 - Updated: 2026-03-13
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere Service Registry and Repository | WebSphere Service Registry and Repository versions 8.5 antérieures à 8.5.5.30 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.4.1 antérieures à 6.4.1.0 iFix01 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.3.x antérieures à 6.3.1.0 iFix06 | ||
| IBM | N/A | Sterling Secure Proxy versions 6.2.0 antérieures à 6.2.0.3 GA | ||
| IBM | Sterling Partner Engagement Manager Standard Edition | Sterling Partner Engagement Manager Standard Edition versions 6.2.3 antérieures à 6.2.3.6 | ||
| IBM | N/A | Sterling Secure Proxy versions 6.2.1 antérieures à 6.2.1.2 GA | ||
| IBM | N/A | Sterling Secure Proxy versions 6.1.0 antérieures à 6.1.0.3 GA | ||
| IBM | Sterling Partner Engagement Manager Essentials Edition | Sterling Partner Engagement Manager Essentials Edition versions 6.2.3 antérieures à 6.2.3.6 | ||
| IBM | Sterling Partner Engagement Manager Standard Edition | Sterling Partner Engagement Manager Standard Edition versions 6.2.4 antérieures à 6.2.4.3 | ||
| IBM | Sterling Partner Engagement Manager Essentials Edition | Sterling Partner Engagement Manager Essentials Edition versions 6.2.4 antérieures à 6.2.4.3 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.4.0 antérieures à 6.4.0.0 iFix02 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Service Registry and Repository versions 8.5 ant\u00e9rieures \u00e0 8.5.5.30",
"product": {
"name": "WebSphere Service Registry and Repository",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.4.1 ant\u00e9rieures \u00e0 6.4.1.0 iFix01",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.x ant\u00e9rieures \u00e0 6.3.1.0 iFix06",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.0 ant\u00e9rieures \u00e0 6.2.0.3 GA",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Standard Edition versions 6.2.3 ant\u00e9rieures \u00e0 6.2.3.6",
"product": {
"name": "Sterling Partner Engagement Manager Standard Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.1 ant\u00e9rieures \u00e0 6.2.1.2 GA",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.0 ant\u00e9rieures \u00e0 6.1.0.3 GA",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Essentials Edition versions 6.2.3 ant\u00e9rieures \u00e0 6.2.3.6",
"product": {
"name": "Sterling Partner Engagement Manager Essentials Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Standard Edition versions 6.2.4 ant\u00e9rieures \u00e0 6.2.4.3",
"product": {
"name": "Sterling Partner Engagement Manager Standard Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Essentials Edition versions 6.2.4 ant\u00e9rieures \u00e0 6.2.4.3",
"product": {
"name": "Sterling Partner Engagement Manager Essentials Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.4.0 ant\u00e9rieures \u00e0 6.4.0.0 iFix02",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-13718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13718"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2019-13990",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13990"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2016-1000338",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000338"
},
{
"name": "CVE-2025-13726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13726"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2016-1000342",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000342"
},
{
"name": "CVE-2021-33813",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33813"
},
{
"name": "CVE-2025-13723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13723"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2022-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-13702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13702"
},
{
"name": "CVE-2023-46233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46233"
},
{
"name": "CVE-2015-5922",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5922"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2016-1000340",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000340"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-14811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14811"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2026-03-13T00:00:00",
"last_revision_date": "2026-03-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0292",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-03-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262893",
"url": "https://www.ibm.com/support/pages/node/7262893"
},
{
"published_at": "2026-03-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263064",
"url": "https://www.ibm.com/support/pages/node/7263064"
},
{
"published_at": "2026-03-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263063",
"url": "https://www.ibm.com/support/pages/node/7263063"
},
{
"published_at": "2026-03-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263065",
"url": "https://www.ibm.com/support/pages/node/7263065"
},
{
"published_at": "2026-03-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263060",
"url": "https://www.ibm.com/support/pages/node/7263060"
},
{
"published_at": "2026-03-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263391",
"url": "https://www.ibm.com/support/pages/node/7263391"
},
{
"published_at": "2026-03-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263061",
"url": "https://www.ibm.com/support/pages/node/7263061"
},
{
"published_at": "2026-03-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262894",
"url": "https://www.ibm.com/support/pages/node/7262894"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263211",
"url": "https://www.ibm.com/support/pages/node/7263211"
},
{
"published_at": "2026-03-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7263059",
"url": "https://www.ibm.com/support/pages/node/7263059"
}
]
}
CERTFR-2026-AVI-0556
Vulnerability from certfr_avis - Published: 2026-05-11 - Updated: 2026-05-11
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 31.3.x antérieures à 3.13.15 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server For Kubernetes versions antérieures à 1.3.0 | ||
| VMware | Tanzu | Tanzu Data Flow on Kubernetes versions antérieures à 2.1.0 | ||
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 4.0.x antérieures à 4.0.20 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à1.33.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.9.3 | ||
| VMware | Tanzu | Tanzu for Valkey on Kubernetes versions antérieures à 3.3.4 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions 6.17.x antérieures à 6.17.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum on Kubernetes versions antérieures à 1.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Platform Extension Framework versions antérieures à 8.0.0 | ||
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 4.2.x antérieures à 4.2.6 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Text versions antérieures à 4.0.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.3.0 | ||
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 4.3.x antérieures à 4.3.0 | ||
| VMware | Tanzu | Tanzu for Valkey on Kubernetes versions antérieures à 3.4.0 | ||
| VMware | Tanzu Gemfire | Tanzu GemFire versions antérieures à 10.2.3 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Upgrade versions antérieures à 2.0.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplumversions antérieures à 7.8.0 | ||
| VMware | Tanzu Gemfire | Tanzu GemFire Vector Database versions antérieures à 1.2.2 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.33.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions 7.7.x antérieures à 7.7.0 | ||
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 4.1.x antérieures à 4.1.11 | ||
| VMware | Tanzu | Tanzu for MySQL on Kubernetes versions antérieures à 2.0.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu RabbitMQ on Kubernetes versions 31.3.x ant\u00e9rieures \u00e0 3.13.15",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server For Kubernetes versions ant\u00e9rieures \u00e0 1.3.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow on Kubernetes versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ on Kubernetes versions 4.0.x ant\u00e9rieures \u00e0 4.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e01.33.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.9.3",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey on Kubernetes versions ant\u00e9rieures \u00e0 3.3.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions 6.17.x ant\u00e9rieures \u00e0 6.17.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum on Kubernetes versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Platform Extension Framework versions ant\u00e9rieures \u00e0 8.0.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ on Kubernetes versions 4.2.x ant\u00e9rieures \u00e0 4.2.6",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Text versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ on Kubernetes versions 4.3.x ant\u00e9rieures \u00e0 4.3.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey on Kubernetes versions ant\u00e9rieures \u00e0 3.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": " Tanzu GemFire versions ant\u00e9rieures \u00e0 10.2.3",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Upgrade versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplumversions ant\u00e9rieures \u00e0 7.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Vector Database versions ant\u00e9rieures \u00e0 1.2.2",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.33.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions 7.7.x ant\u00e9rieures \u00e0 7.7.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ on Kubernetes versions 4.1.x ant\u00e9rieures \u00e0 4.1.11",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Kubernetes versions ant\u00e9rieures \u00e0 2.0.3\n",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"name": "CVE-2019-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12384"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2026-33871",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33871"
},
{
"name": "CVE-2026-22737",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22737"
},
{
"name": "CVE-2020-26939",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26939"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2026-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4878"
},
{
"name": "CVE-2026-35238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35238"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2026-27205",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27205"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2026-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32990"
},
{
"name": "CVE-2022-30973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30973"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2026-1669",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1669"
},
{
"name": "CVE-2026-39892",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39892"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"name": "CVE-2021-27906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27906"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"name": "CVE-2026-34267",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34267"
},
{
"name": "CVE-2023-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2016-1000341",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000341"
},
{
"name": "CVE-2026-32286",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32286"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2026-35239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35239"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2026-25990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25990"
},
{
"name": "CVE-2026-32288",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32288"
},
{
"name": "CVE-2021-36373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36373"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2026-0897",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0897"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2026-34271",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34271"
},
{
"name": "CVE-2019-10094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10094"
},
{
"name": "CVE-2026-24308",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24308"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2026-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3446"
},
{
"name": "CVE-2026-32875",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32875"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2016-1000343",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000343"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2020-10683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10683"
},
{
"name": "CVE-2022-24613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24613"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2026-27456",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27456"
},
{
"name": "CVE-2026-22701",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22701"
},
{
"name": "CVE-2026-34270",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34270"
},
{
"name": "CVE-2026-34303",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34303"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2018-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8036"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2022-26612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26612"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2026-27143",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27143"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2026-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22009"
},
{
"name": "CVE-2018-1320",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1320"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2026-29145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29145"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-49128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49128"
},
{
"name": "CVE-2026-21998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21998"
},
{
"name": "CVE-2019-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17558"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2026-35469",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35469"
},
{
"name": "CVE-2020-13955",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13955"
},
{
"name": "CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"name": "CVE-2020-10650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10650"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-66516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66516"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2016-1000346",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000346"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"name": "CVE-2026-35236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35236"
},
{
"name": "CVE-2026-33870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33870"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2021-35516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2026-5121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5121"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2026-35237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35237"
},
{
"name": "CVE-2014-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0114"
},
{
"name": "CVE-2026-33236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33236"
},
{
"name": "CVE-2022-32287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32287"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2016-1000345",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000345"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2022-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39135"
},
{
"name": "CVE-2025-33042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33042"
},
{
"name": "CVE-2026-34073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34073"
},
{
"name": "CVE-2026-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27144"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22017"
},
{
"name": "CVE-2022-26336",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26336"
},
{
"name": "CVE-2024-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21244"
},
{
"name": "CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2018-1338",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1338"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2021-29262",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29262"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2024-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21503"
},
{
"name": "CVE-2016-1000338",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000338"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2026-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25645"
},
{
"name": "CVE-2026-21860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21860"
},
{
"name": "CVE-2026-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3479"
},
{
"name": "CVE-2024-52012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52012"
},
{
"name": "CVE-2021-35517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2026-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39883"
},
{
"name": "CVE-2026-4424",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4424"
},
{
"name": "CVE-2019-10088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10088"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2026-32281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32281"
},
{
"name": "CVE-2026-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1839"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2026-34515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34515"
},
{
"name": "CVE-2026-5598",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5598"
},
{
"name": "CVE-2026-34519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34519"
},
{
"name": "CVE-2018-11797",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11797"
},
{
"name": "CVE-2026-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22022"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2026-34304",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34304"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2024-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23454"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2026-30922",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-30922"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2019-14439",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14439"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2018-8017",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8017"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-11143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11143"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2026-34986",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34986"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2017-15691",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15691"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2026-22002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22002"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2026-34518",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34518"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2016-1000342",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000342"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2018-17197",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17197"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2026-34308",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34308"
},
{
"name": "CVE-2016-1000339",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000339"
},
{
"name": "CVE-2018-12022",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12022"
},
{
"name": "CVE-2026-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3219"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2023-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21499"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2026-27199",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27199"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2020-1945",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1945"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2021-23926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23926"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2026-22731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22731"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2026-34525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34525"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2026-22732",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22732"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2026-32274",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32274"
},
{
"name": "CVE-2026-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40192"
},
{
"name": "CVE-2026-35240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35240"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2026-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22004"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2018-1324",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1324"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2026-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22001"
},
{
"name": "CVE-2026-32874",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32874"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2026-4539",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4539"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2021-31812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31812"
},
{
"name": "CVE-2026-4519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4519"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2026-32289",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32289"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-66221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66221"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2026-4111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4111"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-66034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66034"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2019-12814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12814"
},
{
"name": "CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2026-3298",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3298"
},
{
"name": "CVE-2026-6100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6100"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21232"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2026-4224",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4224"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2019-12415",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12415"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2026-25854",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25854"
},
{
"name": "CVE-2026-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22015"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2021-22573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22573"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2026-1519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1519"
},
{
"name": "CVE-2026-2332",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2332"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2018-11761",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11761"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2018-11771",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11771"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2018-1335",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1335"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-21493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21493"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2018-11762",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11762"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2026-22733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22733"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2026-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22005"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2016-1000340",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000340"
},
{
"name": "CVE-2026-34516",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34516"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2018-12023",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12023"
},
{
"name": "CVE-2026-3644",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3644"
},
{
"name": "CVE-2026-27140",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27140"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2026-29129",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29129"
},
{
"name": "CVE-2022-31159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
},
{
"name": "CVE-2026-22735",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22735"
},
{
"name": "CVE-2026-34517",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34517"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2020-15522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15522"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2018-1339",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1339"
},
{
"name": "CVE-2016-1000352",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000352"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-14009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14009"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2026-34278",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34278"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2026-34513",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34513"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"name": "CVE-2026-34514",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34514"
},
{
"name": "CVE-2018-11307",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11307"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2019-10086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10086"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-1194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1194"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2026-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4786"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2016-1000344",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000344"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2017-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3164"
},
{
"name": "CVE-2026-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41066"
},
{
"name": "CVE-2026-34520",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34520"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2026-24880",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24880"
},
{
"name": "CVE-2021-35515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
},
{
"name": "CVE-2026-33816",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33816"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2017-7669",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7669"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2019-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0193"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2026-33231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33231"
},
{
"name": "CVE-2022-30126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30126"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2018-1000180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000180"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2026-34276",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34276"
},
{
"name": "CVE-2022-24614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24614"
},
{
"name": "CVE-2026-22815",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22815"
},
{
"name": "CVE-2020-13959",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13959"
},
{
"name": "CVE-2025-24814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24814"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2020-11979",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11979"
},
{
"name": "CVE-2025-67221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67221"
},
{
"name": "CVE-2024-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21243"
},
{
"name": "CVE-2026-33230",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33230"
},
{
"name": "CVE-2021-31811",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31811"
},
{
"name": "CVE-2021-27807",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27807"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2026-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24281"
},
{
"name": "CVE-2026-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1462"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2022-25168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25168"
},
{
"name": "CVE-2026-34293",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34293"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2018-11802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11802"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2018-11796",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11796"
},
{
"name": "CVE-2020-13957",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13957"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2018-1000632",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000632"
},
{
"name": "CVE-2026-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0846"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"initial_release_date": "2026-05-11T00:00:00",
"last_revision_date": "2026-05-11T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0556",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37451",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37451"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37445",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37445"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37460",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37460"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37449",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37449"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37450",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37450"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37466",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37466"
},
{
"published_at": "2026-05-08",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37468",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37468"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37444",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37444"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37461",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37461"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2016-11",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37459"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37446",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37446"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37465",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37465"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37448",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37448"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37447",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37447"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37463",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37463"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37452",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37452"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37462",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37462"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37464",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37464"
}
]
}
CNVD-2018-11930
Vulnerability from cnvd - Published: 2018-06-22目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9
| Name | Bouncy Castle JCE Provider Bouncy Castle JCE Provider <=1.55 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-1000342"
}
},
"description": "Bouncy Castle JCE Provider\u662f\u4e00\u6b3e\u57fa\u4e8eJava\u7684\u52a0\u5bc6\u5305\u3002\r\n\r\nBouncy Castle JCE Provider 1.55\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eECDSA\u672a\u80fd\u5145\u5206\u7684\u9a8c\u8bc1\u4f7f\u7528ASN.1\u8fdb\u884c\u7684\u7b7e\u540d\u7f16\u7801\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u2018\u4e0d\u53ef\u89c1\u2019\u8f93\u5165\u5f15\u5165\u5230\u5df2\u7b7e\u540d\u7684\u6846\u67b6\u4e2d\u3002",
"discovererName": "unknown",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-11930",
"openTime": "2018-06-22",
"patchDescription": "Bouncy Castle JCE Provider\u662f\u4e00\u6b3e\u57fa\u4e8eJava\u7684\u52a0\u5bc6\u5305\u3002\r\n\r\nBouncy Castle JCE Provider 1.55\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eECDSA\u672a\u80fd\u5145\u5206\u7684\u9a8c\u8bc1\u4f7f\u7528ASN.1\u8fdb\u884c\u7684\u7b7e\u540d\u7f16\u7801\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u2018\u4e0d\u53ef\u89c1\u2019\u8f93\u5165\u5f15\u5165\u5230\u5df2\u7b7e\u540d\u7684\u6846\u67b6\u4e2d\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Bouncy Castle JCE Provider\u8bbe\u8ba1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Bouncy Castle JCE Provider Bouncy Castle JCE Provider \u003c=1.55"
},
"referenceLink": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
"serverity": "\u4e2d",
"submitTime": "2018-06-06",
"title": "Bouncy Castle JCE Provider\u8bbe\u8ba1\u6f0f\u6d1e"
}
FKIE_CVE-2016-1000342
Vulnerability from fkie_nvd - Published: 2018-06-04 13:29 - Updated: 2025-05-12 17:37| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2669 | ||
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2927 | ||
| cve@mitre.org | https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9 | Patch, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html | Third Party Advisory | |
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20181127-0004/ | ||
| cve@mitre.org | https://usn.ubuntu.com/3727-1/ | ||
| cve@mitre.org | https://www.oracle.com/security-alerts/cpuoct2020.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2669 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2927 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20181127-0004/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3727-1/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html |
| Vendor | Product | Version | |
|---|---|---|---|
| bouncycastle | bc-java | * | |
| debian | debian_linux | 8.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE27AE65-72E0-408F-808E-7273F4B9D986",
"versionEndIncluding": "1.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure."
},
{
"lang": "es",
"value": "En Bouncy Castle JCE Provider en versiones 1.55 y anteriores, el ECDSA no valida completamente el cifrado ASN.1 de la firma en verificaci\u00f3n. Es posible inyectar elementos extra en la secuencia que forma la firma y, a\u00fan as\u00ed, validarla. En algunos casos, esto podr\u00eda permitir la introducci\u00f3n de datos \"invisibles\" en una estructura firmada."
}
],
"id": "CVE-2016-1000342",
"lastModified": "2025-05-12T17:37:16.527",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-06-04T13:29:00.387",
"references": [
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"source": "cve@mitre.org",
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/3727-1/"
},
{
"source": "cve@mitre.org",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/3727-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-QCJ7-G2J5-G7R3
Vulnerability from github – Published: 2018-10-17 16:24 – Updated: 2025-09-02 20:27In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.bouncycastle:bcprov-jdk14"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.56"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.bouncycastle:bcprov-jdk15"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.56"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.bouncycastle:bcprov-jdk15on"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.56"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2016-1000342"
],
"database_specific": {
"cwe_ids": [
"CWE-347"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:51:36Z",
"nvd_published_at": "2018-06-04T13:29:00Z",
"severity": "HIGH"
},
"details": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"id": "GHSA-qcj7-g2j5-g7r3",
"modified": "2025-09-02T20:27:34Z",
"published": "2018-10-17T16:24:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000342"
},
{
"type": "WEB",
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"type": "PACKAGE",
"url": "https://github.com/bcgit/bc-java"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20181127-0004"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/3727-1"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification"
}
GSD-2016-1000342
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2016-1000342",
"description": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"id": "GSD-2016-1000342",
"references": [
"https://www.suse.com/security/cve/CVE-2016-1000342.html",
"https://access.redhat.com/errata/RHSA-2018:2927",
"https://access.redhat.com/errata/RHSA-2018:2669",
"https://ubuntu.com/security/CVE-2016-1000342",
"https://advisories.mageia.org/CVE-2016-1000342.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-1000342"
],
"details": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"id": "GSD-2016-1000342",
"modified": "2023-12-13T01:21:18.054513Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1000342",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20180707 [SECURITY] [DLA 1418-1] bouncycastle security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"name": "RHSA-2018:2669",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name": "USN-3727-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3727-1/"
},
{
"name": "RHSA-2018:2927",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181127-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
},
{
"name": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,1.56)",
"affected_versions": "All versions before 1.56",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-347",
"CWE-707",
"CWE-937"
],
"date": "2021-09-16",
"description": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"fixed_versions": [
"1.56"
],
"identifier": "CVE-2016-1000342",
"identifiers": [
"GHSA-qcj7-g2j5-g7r3",
"CVE-2016-1000342"
],
"not_impacted": "All versions starting from 1.56",
"package_slug": "maven/org.bouncycastle/bcprov-jdk14",
"pubdate": "2018-10-17",
"solution": "Upgrade to version 1.56 or above.",
"title": "Improper Verification of Cryptographic Signature",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2016-1000342",
"https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
"https://github.com/advisories/GHSA-qcj7-g2j5-g7r3"
],
"uuid": "0febbb06-29bc-4fac-889a-777a61612927"
},
{
"affected_range": "(,1.56)",
"affected_versions": "All versions before 1.56",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-347",
"CWE-707",
"CWE-937"
],
"date": "2021-09-16",
"description": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"fixed_versions": [
"1.56"
],
"identifier": "CVE-2016-1000342",
"identifiers": [
"GHSA-qcj7-g2j5-g7r3",
"CVE-2016-1000342"
],
"not_impacted": "All versions starting from 1.56",
"package_slug": "maven/org.bouncycastle/bcprov-jdk15",
"pubdate": "2018-10-17",
"solution": "Upgrade to version 1.56 or above.",
"title": "Improper Verification of Cryptographic Signature",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2016-1000342",
"https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
"https://github.com/advisories/GHSA-qcj7-g2j5-g7r3"
],
"uuid": "9ef230a5-4896-411b-b080-3c707773011b"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.55",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1000342"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
},
{
"name": "[debian-lts-announce] 20180707 [SECURITY] [DLA 1418-1] bouncycastle security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
},
{
"name": "USN-3727-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/3727-1/"
},
{
"name": "RHSA-2018:2669",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name": "RHSA-2018:2927",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181127-0004/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
},
{
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"tags": [],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2020-10-20T22:15Z",
"publishedDate": "2018-06-04T13:29Z"
}
}
}
OPENSUSE-SU-2024:10661-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2016-1000338/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000339/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000340/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000341/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000342/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000343/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000344/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000345/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000346/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000352/ | self |
| https://www.suse.com/security/cve/CVE-2017-13098/ | self |
| https://www.suse.com/security/cve/CVE-2018-1000180/ | self |
| https://www.suse.com/security/cve/CVE-2018-1000613/ | self |
| https://www.suse.com/security/cve/CVE-2019-17359/ | self |
| https://www.suse.com/security/cve/CVE-2020-15522/ | self |
| https://www.suse.com/security/cve/CVE-2020-28052/ | self |
| https://www.suse.com/security/cve/CVE-2016-1000338 | external |
| https://bugzilla.suse.com/1095722 | external |
| https://www.suse.com/security/cve/CVE-2016-1000339 | external |
| https://bugzilla.suse.com/1095853 | external |
| https://www.suse.com/security/cve/CVE-2016-1000340 | external |
| https://bugzilla.suse.com/1095854 | external |
| https://www.suse.com/security/cve/CVE-2016-1000341 | external |
| https://bugzilla.suse.com/1095852 | external |
| https://www.suse.com/security/cve/CVE-2016-1000342 | external |
| https://bugzilla.suse.com/1095850 | external |
| https://www.suse.com/security/cve/CVE-2016-1000343 | external |
| https://bugzilla.suse.com/1095849 | external |
| https://www.suse.com/security/cve/CVE-2016-1000344 | external |
| https://bugzilla.suse.com/1096026 | external |
| https://www.suse.com/security/cve/CVE-2016-1000345 | external |
| https://bugzilla.suse.com/1096025 | external |
| https://www.suse.com/security/cve/CVE-2016-1000346 | external |
| https://bugzilla.suse.com/1096024 | external |
| https://www.suse.com/security/cve/CVE-2016-1000352 | external |
| https://bugzilla.suse.com/1096022 | external |
| https://www.suse.com/security/cve/CVE-2017-13098 | external |
| https://bugzilla.suse.com/1072697 | external |
| https://www.suse.com/security/cve/CVE-2018-1000180 | external |
| https://bugzilla.suse.com/1096291 | external |
| https://bugzilla.suse.com/1153385 | external |
| https://www.suse.com/security/cve/CVE-2018-1000613 | external |
| https://bugzilla.suse.com/1096291 | external |
| https://bugzilla.suse.com/1100694 | external |
| https://bugzilla.suse.com/1153385 | external |
| https://www.suse.com/security/cve/CVE-2019-17359 | external |
| https://bugzilla.suse.com/1153385 | external |
| https://www.suse.com/security/cve/CVE-2020-15522 | external |
| https://bugzilla.suse.com/1186328 | external |
| https://www.suse.com/security/cve/CVE-2020-28052 | external |
| https://bugzilla.suse.com/1180215 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "bouncycastle-1.68-3.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the bouncycastle-1.68-3.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10661",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10661-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000338 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000339 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000340 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000341 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000342 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000343 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000344 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000345 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000346 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000346/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000352 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13098 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000180 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000613 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17359 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15522 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15522/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28052 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28052/"
}
],
"title": "bouncycastle-1.68-3.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10661-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bouncycastle-1.68-3.2.aarch64",
"product": {
"name": "bouncycastle-1.68-3.2.aarch64",
"product_id": "bouncycastle-1.68-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "bouncycastle-javadoc-1.68-3.2.aarch64",
"product": {
"name": "bouncycastle-javadoc-1.68-3.2.aarch64",
"product_id": "bouncycastle-javadoc-1.68-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "bouncycastle-mail-1.68-3.2.aarch64",
"product": {
"name": "bouncycastle-mail-1.68-3.2.aarch64",
"product_id": "bouncycastle-mail-1.68-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "bouncycastle-pg-1.68-3.2.aarch64",
"product": {
"name": "bouncycastle-pg-1.68-3.2.aarch64",
"product_id": "bouncycastle-pg-1.68-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "bouncycastle-pkix-1.68-3.2.aarch64",
"product": {
"name": "bouncycastle-pkix-1.68-3.2.aarch64",
"product_id": "bouncycastle-pkix-1.68-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "bouncycastle-tls-1.68-3.2.aarch64",
"product": {
"name": "bouncycastle-tls-1.68-3.2.aarch64",
"product_id": "bouncycastle-tls-1.68-3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bouncycastle-1.68-3.2.ppc64le",
"product": {
"name": "bouncycastle-1.68-3.2.ppc64le",
"product_id": "bouncycastle-1.68-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "bouncycastle-javadoc-1.68-3.2.ppc64le",
"product": {
"name": "bouncycastle-javadoc-1.68-3.2.ppc64le",
"product_id": "bouncycastle-javadoc-1.68-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "bouncycastle-mail-1.68-3.2.ppc64le",
"product": {
"name": "bouncycastle-mail-1.68-3.2.ppc64le",
"product_id": "bouncycastle-mail-1.68-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "bouncycastle-pg-1.68-3.2.ppc64le",
"product": {
"name": "bouncycastle-pg-1.68-3.2.ppc64le",
"product_id": "bouncycastle-pg-1.68-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "bouncycastle-pkix-1.68-3.2.ppc64le",
"product": {
"name": "bouncycastle-pkix-1.68-3.2.ppc64le",
"product_id": "bouncycastle-pkix-1.68-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "bouncycastle-tls-1.68-3.2.ppc64le",
"product": {
"name": "bouncycastle-tls-1.68-3.2.ppc64le",
"product_id": "bouncycastle-tls-1.68-3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bouncycastle-1.68-3.2.s390x",
"product": {
"name": "bouncycastle-1.68-3.2.s390x",
"product_id": "bouncycastle-1.68-3.2.s390x"
}
},
{
"category": "product_version",
"name": "bouncycastle-javadoc-1.68-3.2.s390x",
"product": {
"name": "bouncycastle-javadoc-1.68-3.2.s390x",
"product_id": "bouncycastle-javadoc-1.68-3.2.s390x"
}
},
{
"category": "product_version",
"name": "bouncycastle-mail-1.68-3.2.s390x",
"product": {
"name": "bouncycastle-mail-1.68-3.2.s390x",
"product_id": "bouncycastle-mail-1.68-3.2.s390x"
}
},
{
"category": "product_version",
"name": "bouncycastle-pg-1.68-3.2.s390x",
"product": {
"name": "bouncycastle-pg-1.68-3.2.s390x",
"product_id": "bouncycastle-pg-1.68-3.2.s390x"
}
},
{
"category": "product_version",
"name": "bouncycastle-pkix-1.68-3.2.s390x",
"product": {
"name": "bouncycastle-pkix-1.68-3.2.s390x",
"product_id": "bouncycastle-pkix-1.68-3.2.s390x"
}
},
{
"category": "product_version",
"name": "bouncycastle-tls-1.68-3.2.s390x",
"product": {
"name": "bouncycastle-tls-1.68-3.2.s390x",
"product_id": "bouncycastle-tls-1.68-3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bouncycastle-1.68-3.2.x86_64",
"product": {
"name": "bouncycastle-1.68-3.2.x86_64",
"product_id": "bouncycastle-1.68-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "bouncycastle-javadoc-1.68-3.2.x86_64",
"product": {
"name": "bouncycastle-javadoc-1.68-3.2.x86_64",
"product_id": "bouncycastle-javadoc-1.68-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "bouncycastle-mail-1.68-3.2.x86_64",
"product": {
"name": "bouncycastle-mail-1.68-3.2.x86_64",
"product_id": "bouncycastle-mail-1.68-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "bouncycastle-pg-1.68-3.2.x86_64",
"product": {
"name": "bouncycastle-pg-1.68-3.2.x86_64",
"product_id": "bouncycastle-pg-1.68-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "bouncycastle-pkix-1.68-3.2.x86_64",
"product": {
"name": "bouncycastle-pkix-1.68-3.2.x86_64",
"product_id": "bouncycastle-pkix-1.68-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "bouncycastle-tls-1.68-3.2.x86_64",
"product": {
"name": "bouncycastle-tls-1.68-3.2.x86_64",
"product_id": "bouncycastle-tls-1.68-3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-1.68-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64"
},
"product_reference": "bouncycastle-1.68-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-1.68-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le"
},
"product_reference": "bouncycastle-1.68-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-1.68-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x"
},
"product_reference": "bouncycastle-1.68-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-1.68-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64"
},
"product_reference": "bouncycastle-1.68-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-javadoc-1.68-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64"
},
"product_reference": "bouncycastle-javadoc-1.68-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-javadoc-1.68-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le"
},
"product_reference": "bouncycastle-javadoc-1.68-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-javadoc-1.68-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x"
},
"product_reference": "bouncycastle-javadoc-1.68-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-javadoc-1.68-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64"
},
"product_reference": "bouncycastle-javadoc-1.68-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-mail-1.68-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64"
},
"product_reference": "bouncycastle-mail-1.68-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-mail-1.68-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le"
},
"product_reference": "bouncycastle-mail-1.68-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-mail-1.68-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x"
},
"product_reference": "bouncycastle-mail-1.68-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-mail-1.68-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64"
},
"product_reference": "bouncycastle-mail-1.68-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-pg-1.68-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64"
},
"product_reference": "bouncycastle-pg-1.68-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-pg-1.68-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le"
},
"product_reference": "bouncycastle-pg-1.68-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-pg-1.68-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x"
},
"product_reference": "bouncycastle-pg-1.68-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-pg-1.68-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64"
},
"product_reference": "bouncycastle-pg-1.68-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-pkix-1.68-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64"
},
"product_reference": "bouncycastle-pkix-1.68-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-pkix-1.68-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le"
},
"product_reference": "bouncycastle-pkix-1.68-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-pkix-1.68-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x"
},
"product_reference": "bouncycastle-pkix-1.68-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-pkix-1.68-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64"
},
"product_reference": "bouncycastle-pkix-1.68-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-tls-1.68-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64"
},
"product_reference": "bouncycastle-tls-1.68-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-tls-1.68-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le"
},
"product_reference": "bouncycastle-tls-1.68-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-tls-1.68-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x"
},
"product_reference": "bouncycastle-tls-1.68-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bouncycastle-tls-1.68-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
},
"product_reference": "bouncycastle-tls-1.68-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1000338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000338"
}
],
"notes": [
{
"category": "general",
"text": "In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000338",
"url": "https://www.suse.com/security/cve/CVE-2016-1000338"
},
{
"category": "external",
"summary": "SUSE Bug 1095722 for CVE-2016-1000338",
"url": "https://bugzilla.suse.com/1095722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1000338"
},
{
"cve": "CVE-2016-1000339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000339"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000339",
"url": "https://www.suse.com/security/cve/CVE-2016-1000339"
},
{
"category": "external",
"summary": "SUSE Bug 1095853 for CVE-2016-1000339",
"url": "https://bugzilla.suse.com/1095853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000339"
},
{
"cve": "CVE-2016-1000340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000340"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000340",
"url": "https://www.suse.com/security/cve/CVE-2016-1000340"
},
{
"category": "external",
"summary": "SUSE Bug 1095854 for CVE-2016-1000340",
"url": "https://bugzilla.suse.com/1095854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1000340"
},
{
"cve": "CVE-2016-1000341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000341"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature\u0027s k value and ultimately the private value as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000341",
"url": "https://www.suse.com/security/cve/CVE-2016-1000341"
},
{
"category": "external",
"summary": "SUSE Bug 1095852 for CVE-2016-1000341",
"url": "https://bugzilla.suse.com/1095852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000341"
},
{
"cve": "CVE-2016-1000342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000342"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000342",
"url": "https://www.suse.com/security/cve/CVE-2016-1000342"
},
{
"category": "external",
"summary": "SUSE Bug 1095850 for CVE-2016-1000342",
"url": "https://bugzilla.suse.com/1095850"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1000342"
},
{
"cve": "CVE-2016-1000343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000343"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000343",
"url": "https://www.suse.com/security/cve/CVE-2016-1000343"
},
{
"category": "external",
"summary": "SUSE Bug 1095849 for CVE-2016-1000343",
"url": "https://bugzilla.suse.com/1095849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1000343"
},
{
"cve": "CVE-2016-1000344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000344"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000344",
"url": "https://www.suse.com/security/cve/CVE-2016-1000344"
},
{
"category": "external",
"summary": "SUSE Bug 1096026 for CVE-2016-1000344",
"url": "https://bugzilla.suse.com/1096026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1000344"
},
{
"cve": "CVE-2016-1000345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000345"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000345",
"url": "https://www.suse.com/security/cve/CVE-2016-1000345"
},
{
"category": "external",
"summary": "SUSE Bug 1096025 for CVE-2016-1000345",
"url": "https://bugzilla.suse.com/1096025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000345"
},
{
"cve": "CVE-2016-1000346",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000346"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party\u0027s private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000346",
"url": "https://www.suse.com/security/cve/CVE-2016-1000346"
},
{
"category": "external",
"summary": "SUSE Bug 1096024 for CVE-2016-1000346",
"url": "https://bugzilla.suse.com/1096024"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000346"
},
{
"cve": "CVE-2016-1000352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000352"
}
],
"notes": [
{
"category": "general",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000352",
"url": "https://www.suse.com/security/cve/CVE-2016-1000352"
},
{
"category": "external",
"summary": "SUSE Bug 1096022 for CVE-2016-1000352",
"url": "https://bugzilla.suse.com/1096022"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1000352"
},
{
"cve": "CVE-2017-13098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13098"
}
],
"notes": [
{
"category": "general",
"text": "BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as \"ROBOT.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13098",
"url": "https://www.suse.com/security/cve/CVE-2017-13098"
},
{
"category": "external",
"summary": "SUSE Bug 1072697 for CVE-2017-13098",
"url": "https://bugzilla.suse.com/1072697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13098"
},
{
"cve": "CVE-2018-1000180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000180"
}
],
"notes": [
{
"category": "general",
"text": "Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000180",
"url": "https://www.suse.com/security/cve/CVE-2018-1000180"
},
{
"category": "external",
"summary": "SUSE Bug 1096291 for CVE-2018-1000180",
"url": "https://bugzilla.suse.com/1096291"
},
{
"category": "external",
"summary": "SUSE Bug 1153385 for CVE-2018-1000180",
"url": "https://bugzilla.suse.com/1153385"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000180"
},
{
"cve": "CVE-2018-1000613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000613"
}
],
"notes": [
{
"category": "general",
"text": "Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs 1.58 up to but not including 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027) vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000613",
"url": "https://www.suse.com/security/cve/CVE-2018-1000613"
},
{
"category": "external",
"summary": "SUSE Bug 1096291 for CVE-2018-1000613",
"url": "https://bugzilla.suse.com/1096291"
},
{
"category": "external",
"summary": "SUSE Bug 1100694 for CVE-2018-1000613",
"url": "https://bugzilla.suse.com/1100694"
},
{
"category": "external",
"summary": "SUSE Bug 1153385 for CVE-2018-1000613",
"url": "https://bugzilla.suse.com/1153385"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000613"
},
{
"cve": "CVE-2019-17359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17359"
}
],
"notes": [
{
"category": "general",
"text": "The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large attempted memory allocation, and resultant OutOfMemoryError error, via crafted ASN.1 data. This is fixed in 1.64.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17359",
"url": "https://www.suse.com/security/cve/CVE-2019-17359"
},
{
"category": "external",
"summary": "SUSE Bug 1153385 for CVE-2019-17359",
"url": "https://bugzilla.suse.com/1153385"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-17359"
},
{
"cve": "CVE-2020-15522",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15522"
}
],
"notes": [
{
"category": "general",
"text": "Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15522",
"url": "https://www.suse.com/security/cve/CVE-2020-15522"
},
{
"category": "external",
"summary": "SUSE Bug 1186328 for CVE-2020-15522",
"url": "https://bugzilla.suse.com/1186328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-15522"
},
{
"cve": "CVE-2020-28052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28052"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28052",
"url": "https://www.suse.com/security/cve/CVE-2020-28052"
},
{
"category": "external",
"summary": "SUSE Bug 1180215 for CVE-2020-28052",
"url": "https://bugzilla.suse.com/1180215"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-javadoc-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-mail-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pg-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-pkix-1.68-3.2.x86_64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.aarch64",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.ppc64le",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.s390x",
"openSUSE Tumbleweed:bouncycastle-tls-1.68-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28052"
}
]
}
RHSA-2018:2669
Vulnerability from csaf_redhat - Published: 2018-09-11 07:53 - Updated: 2026-05-14 22:24Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
Workaround
|
The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.
CWE-682 - Incorrect Calculation| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
CWE-338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
Async Http Client (aka async-http-client) before 2.0.35 can be tricked into connecting to a host different from the one extracted by java.net.URI if a '?' character occurs in a fragment identifier. Similar bugs were previously identified in cURL (CVE-2016-8624) and Oracle Java 8 java.net.URL.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
An infinite loop vulnerability was discovered in Apache Tika prior to version 1.18. A remote attacker could exploit this to cause a denial of service via crafted file.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
In Apache PDFBox 1.8.0 to 1.8.14 and 2.0.0RC1 to 2.0.10, a carefully crafted (or fuzzed) file can trigger an infinite loop which leads to an out of memory exception in Apache PDFBox's AFMParser.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
An XML deserialization vulnerability was discovered in slf4j's EventData, which accepts an XML serialized string and can lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
A JNDI Injection vulnerability exists in Jolokia agent version 1.3.7 in the proxy mode that allows a remote attacker to run arbitrary Java code on the server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
A vulnerability was found in BouncyCastle. The number of iterations of the Miller-Rabin primality test was incorrectly calculated (according to FIPS 186-4 C.3). Under some circumstances, this could lead to the generation of weak RSA key pairs.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 7
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:7
|
— |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2018:2669 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://access.redhat.com/jbossnetwork/restricted… | external |
| https://access.redhat.com/documentation/en-us/red… | external |
| https://access.redhat.com/articles/2939351 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1091938 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1487563 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1544620 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1548909 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1559316 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1559317 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1564408 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1571050 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1572421 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1572424 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1573045 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588306 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588313 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588314 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588323 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588327 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588330 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588688 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588695 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588708 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588715 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588721 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1597490 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2014-0114 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1091938 | external |
| https://www.cve.org/CVERecord?id=CVE-2014-0114 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2014-0114 | external |
| https://access.redhat.com/security/cve/CVE-2016-5397 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1544620 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-5397 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-5397 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000338 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588313 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000338 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000338 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000339 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588695 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000339 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000339 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000340 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588688 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000340 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000340 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000341 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588708 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000341 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000341 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000342 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588715 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000342 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000342 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000343 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588721 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000343 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000343 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000344 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588314 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000344 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000344 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000345 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588323 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000345 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000345 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000346 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588327 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000346 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000346 | external |
| https://access.redhat.com/security/cve/CVE-2016-1000352 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588330 | external |
| https://www.cve.org/CVERecord?id=CVE-2016-1000352 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2016-1000352 | external |
| https://access.redhat.com/security/cve/CVE-2017-14063 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1487563 | external |
| https://www.cve.org/CVERecord?id=CVE-2017-14063 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2017-14063 | external |
| https://access.redhat.com/security/cve/CVE-2018-1114 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1573045 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-1114 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-1114 | external |
| https://bugs.openjdk.java.net/browse/JDK-6956385 | external |
| https://issues.jboss.org/browse/UNDERTOW-1338 | external |
| https://access.redhat.com/security/cve/CVE-2018-1271 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1571050 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-1271 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-1271 | external |
| https://pivotal.io/security/cve-2018-1271 | external |
| https://access.redhat.com/security/cve/CVE-2018-1272 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1564408 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-1272 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-1272 | external |
| https://pivotal.io/security/cve-2018-1272 | external |
| https://access.redhat.com/security/cve/CVE-2018-1338 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1572421 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-1338 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-1338 | external |
| https://lists.apache.org/thread.html/4d20c5748fb9… | external |
| https://access.redhat.com/security/cve/CVE-2018-1339 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1572424 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-1339 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-1339 | external |
| https://lists.apache.org/thread.html/4d2cb5c81940… | external |
| https://access.redhat.com/security/cve/CVE-2018-8036 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1597490 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-8036 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-8036 | external |
| http://www.openwall.com/lists/oss-security/2018/06/29/1 | external |
| https://access.redhat.com/security/cve/CVE-2018-8088 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1548909 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-8088 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-8088 | external |
| https://access.redhat.com/security/cve/CVE-2018-1000129 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1559317 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-1000129 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-1000129 | external |
| https://jolokia.org/#Security_fixes_with_1.5.0 | external |
| https://access.redhat.com/security/cve/CVE-2018-1000130 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1559316 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-1000130 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-1000130 | external |
| https://access.redhat.com/security/cve/CVE-2018-1000180 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=1588306 | external |
| https://www.cve.org/CVERecord?id=CVE-2018-1000180 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2018-1000180 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Fuse.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform.\n\nThis release of Red Hat Fuse 7.1 serves as a replacement for Red Hat Fuse 7.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* Apache Struts 1: Class Loader manipulation via request parameters (CVE-2014-0114)\n\n* thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands (CVE-2016-5397)\n\n* slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088)\n\n* jolokia: JMX proxy mode vulnerable to remote code execution (CVE-2018-1000130)\n\n* bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data (CVE-2016-1000338)\n\n* bouncycastle: Information leak in AESFastEngine class (CVE-2016-1000339)\n\n* bouncycastle: Information exposure in DSA signature generation via timing attack (CVE-2016-1000341)\n\n* bouncycastle: ECDSA improper validation of ASN.1 encoding of signature (CVE-2016-1000342)\n\n* bouncycastle: DHIES implementation allowed the use of ECB mode (CVE-2016-1000344)\n\n* bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack (CVE-2016-1000345)\n\n* bouncycastle: Other party DH public keys are not fully validated (CVE-2016-1000346)\n\n* bouncycastle: ECIES implementation allowed the use of ECB mode (CVE-2016-1000352)\n\n* async-http-client: Invalid URL parsing with \u0027?\u0027 (CVE-2017-14063)\n\n* undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service (CVE-2018-1114)\n\n* spring-framework: Directory traversal vulnerability with static resources on Windows filesystems (CVE-2018-1271)\n\n* tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service (CVE-2018-1338)\n\n* tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service (CVE-2018-1339)\n\n* pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF (CVE-2018-8036)\n\n* jolokia: Cross site scripting in the HTTP servlet (CVE-2018-1000129)\n\n* bouncycastle: flaw in the low-level interface to RSA key pair generator (CVE-2018-1000180)\n\n* bouncycastle: Carry propagation bug in math.raw.Nat??? class (CVE-2016-1000340)\n\n* bouncycastle: DSA key pair generator generates a weak private key by default (CVE-2016-1000343)\n\n* spring-framework: Multipart content pollution (CVE-2018-1272)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Chris McCown for reporting CVE-2018-8088.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2669",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=7.1.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=7.1.0"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.1/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.1/"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/2939351",
"url": "https://access.redhat.com/articles/2939351"
},
{
"category": "external",
"summary": "1091938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938"
},
{
"category": "external",
"summary": "1487563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487563"
},
{
"category": "external",
"summary": "1544620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544620"
},
{
"category": "external",
"summary": "1548909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548909"
},
{
"category": "external",
"summary": "1559316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559316"
},
{
"category": "external",
"summary": "1559317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559317"
},
{
"category": "external",
"summary": "1564408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564408"
},
{
"category": "external",
"summary": "1571050",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571050"
},
{
"category": "external",
"summary": "1572421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572421"
},
{
"category": "external",
"summary": "1572424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572424"
},
{
"category": "external",
"summary": "1573045",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573045"
},
{
"category": "external",
"summary": "1588306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588306"
},
{
"category": "external",
"summary": "1588313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588313"
},
{
"category": "external",
"summary": "1588314",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588314"
},
{
"category": "external",
"summary": "1588323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588323"
},
{
"category": "external",
"summary": "1588327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588327"
},
{
"category": "external",
"summary": "1588330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588330"
},
{
"category": "external",
"summary": "1588688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588688"
},
{
"category": "external",
"summary": "1588695",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588695"
},
{
"category": "external",
"summary": "1588708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588708"
},
{
"category": "external",
"summary": "1588715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588715"
},
{
"category": "external",
"summary": "1588721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588721"
},
{
"category": "external",
"summary": "1597490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597490"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2669.json"
}
],
"title": "Red Hat Security Advisory: Fuse 7.1 security update",
"tracking": {
"current_release_date": "2026-05-14T22:24:00+00:00",
"generator": {
"date": "2026-05-14T22:24:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2018:2669",
"initial_release_date": "2018-09-11T07:53:47+00:00",
"revision_history": [
{
"date": "2018-09-11T07:53:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-09-11T07:53:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:24:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Fuse 7",
"product": {
"name": "Red Hat JBoss Fuse 7",
"product_id": "Red Hat JBoss Fuse 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_fuse:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Fuse"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-0114",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2014-04-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1091938"
}
],
"notes": [
{
"category": "description",
"text": "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "1: Class Loader manipulation via request parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows attackers to manipulate ClassLoader properties on a vulnerable server. The impact of this depends on which ClassLoader properties are exposed. Exploits that lead to remote code execution have been published. These exploits rely on ClassLoader properties that are exposed on Tomcat 8, which is not included in any supported Red Hat products. However, some Red Hat products that ship Struts 1 do expose ClassLoader properties that could potentially be exploited. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/site/solutions/869353",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0114"
},
{
"category": "external",
"summary": "RHBZ#1091938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0114"
}
],
"release_date": "2014-04-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"category": "workaround",
"details": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.VCaGk3V53Ua",
"product_ids": [
"Red Hat JBoss Fuse 7"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "1: Class Loader manipulation via request parameters"
},
{
"cve": "CVE-2016-5397",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2018-02-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1544620"
}
],
"notes": [
{
"category": "description",
"text": "The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libthrift is a library used by OpenDaylight which is shipped with Red Hat OpenStack. Whilst the version of the library used contains the vulnerable code it is not used by OpenDaylight and hence not exposed.\n\nJBoss fuse 6.3 ships libthrift via insight-activemq fabric-8 profile, however the vulnerable code is not used by fabric-8 so fuse 6.3 is not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5397"
},
{
"category": "external",
"summary": "RHBZ#1544620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5397",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5397"
}
],
"release_date": "2016-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands"
},
{
"cve": "CVE-2016-1000338",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588313"
}
],
"notes": [
{
"category": "description",
"text": "In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000338"
},
{
"category": "external",
"summary": "RHBZ#1588313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588313"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000338",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000338"
}
],
"release_date": "2016-10-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data"
},
{
"cve": "CVE-2016-1000339",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588695"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: Information leak in AESFastEngine class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000339"
},
{
"category": "external",
"summary": "RHBZ#1588695",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588695"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000339",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000339"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000339",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000339"
}
],
"release_date": "2018-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: Information leak in AESFastEngine class"
},
{
"cve": "CVE-2016-1000340",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588688"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: Carry propagation bug in math.raw.Nat??? class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Low. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000340"
},
{
"category": "external",
"summary": "RHBZ#1588688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588688"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000340",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000340"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000340",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000340"
}
],
"release_date": "2018-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "bouncycastle: Carry propagation bug in math.raw.Nat??? class"
},
{
"cve": "CVE-2016-1000341",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588708"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature\u0027s k value and ultimately the private value as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: Information exposure in DSA signature generation via timing attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000341"
},
{
"category": "external",
"summary": "RHBZ#1588708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588708"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000341",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000341"
}
],
"release_date": "2018-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: Information exposure in DSA signature generation via timing attack"
},
{
"cve": "CVE-2016-1000342",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588715"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of \u0027invisible\u0027 data into a signed structure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: ECDSA improper validation of ASN.1 encoding of signature",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000342"
},
{
"category": "external",
"summary": "RHBZ#1588715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000342",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000342"
}
],
"release_date": "2018-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: ECDSA improper validation of ASN.1 encoding of signature"
},
{
"cve": "CVE-2016-1000343",
"cwe": {
"id": "CWE-338",
"name": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588721"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: DSA key pair generator generates a weak private key by default",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Low. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000343"
},
{
"category": "external",
"summary": "RHBZ#1588721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000343",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000343"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000343",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000343"
}
],
"release_date": "2018-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "bouncycastle: DSA key pair generator generates a weak private key by default"
},
{
"cve": "CVE-2016-1000344",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588314"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: DHIES implementation allowed the use of ECB mode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000344"
},
{
"category": "external",
"summary": "RHBZ#1588314",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588314"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000344",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000344"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000344",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000344"
}
],
"release_date": "2016-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: DHIES implementation allowed the use of ECB mode"
},
{
"cve": "CVE-2016-1000345",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588323"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000345"
},
{
"category": "external",
"summary": "RHBZ#1588323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588323"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000345",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000345"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000345",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000345"
}
],
"release_date": "2016-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack"
},
{
"cve": "CVE-2016-1000346",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588327"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party\u0027s private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: Other party DH public keys are not fully validated",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000346"
},
{
"category": "external",
"summary": "RHBZ#1588327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000346",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000346"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000346",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000346"
}
],
"release_date": "2016-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: Other party DH public keys are not fully validated"
},
{
"cve": "CVE-2016-1000352",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588330"
}
],
"notes": [
{
"category": "description",
"text": "In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: ECIES implementation allowed the use of ECB mode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000352"
},
{
"category": "external",
"summary": "RHBZ#1588330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588330"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000352",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000352"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000352",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000352"
}
],
"release_date": "2016-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: ECIES implementation allowed the use of ECB mode"
},
{
"cve": "CVE-2017-14063",
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487563"
}
],
"notes": [
{
"category": "description",
"text": "Async Http Client (aka async-http-client) before 2.0.35 can be tricked into connecting to a host different from the one extracted by java.net.URI if a \u0027?\u0027 character occurs in a fragment identifier. Similar bugs were previously identified in cURL (CVE-2016-8624) and Oracle Java 8 java.net.URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "async-http-client: Invalid URL parsing with \u0027?\u0027",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14063"
},
{
"category": "external",
"summary": "RHBZ#1487563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487563"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14063",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14063"
}
],
"release_date": "2017-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "async-http-client: Invalid URL parsing with \u0027?\u0027"
},
{
"cve": "CVE-2018-1114",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-04-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1573045"
}
],
"notes": [
{
"category": "description",
"text": "It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1114"
},
{
"category": "external",
"summary": "RHBZ#1573045",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573045"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1114"
},
{
"category": "external",
"summary": "https://bugs.openjdk.java.net/browse/JDK-6956385",
"url": "https://bugs.openjdk.java.net/browse/JDK-6956385"
},
{
"category": "external",
"summary": "https://issues.jboss.org/browse/UNDERTOW-1338",
"url": "https://issues.jboss.org/browse/UNDERTOW-1338"
}
],
"release_date": "2018-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service"
},
{
"cve": "CVE-2018-1271",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1571050"
}
],
"notes": [
{
"category": "description",
"text": "Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-framework: Directory traversal vulnerability with static resources on Windows filesystems",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1271"
},
{
"category": "external",
"summary": "RHBZ#1571050",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571050"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1271"
},
{
"category": "external",
"summary": "https://pivotal.io/security/cve-2018-1271",
"url": "https://pivotal.io/security/cve-2018-1271"
}
],
"release_date": "2018-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "spring-framework: Directory traversal vulnerability with static resources on Windows filesystems"
},
{
"cve": "CVE-2018-1272",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2018-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1564408"
}
],
"notes": [
{
"category": "description",
"text": "Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-framework: Multipart content pollution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1272"
},
{
"category": "external",
"summary": "RHBZ#1564408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1272"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1272",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1272"
},
{
"category": "external",
"summary": "https://pivotal.io/security/cve-2018-1272",
"url": "https://pivotal.io/security/cve-2018-1272"
}
],
"release_date": "2018-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "spring-framework: Multipart content pollution"
},
{
"cve": "CVE-2018-1338",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2018-04-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1572421"
}
],
"notes": [
{
"category": "description",
"text": "An infinite loop vulnerability was discovered in Apache Tika prior to version 1.18. A remote attacker could exploit this to cause a denial of service via crafted file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1338"
},
{
"category": "external",
"summary": "RHBZ#1572421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572421"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1338",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1338"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E",
"url": "https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E"
}
],
"release_date": "2018-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service"
},
{
"cve": "CVE-2018-1339",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2018-04-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1572424"
}
],
"notes": [
{
"category": "description",
"text": "A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika\u0027s ChmParser in versions of Apache Tika before 1.18.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1339"
},
{
"category": "external",
"summary": "RHBZ#1572424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572424"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1339",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1339"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1339",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1339"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828@%3Cdev.tika.apache.org%3E",
"url": "https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828@%3Cdev.tika.apache.org%3E"
}
],
"release_date": "2018-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service"
},
{
"cve": "CVE-2018-8036",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-07-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1597490"
}
],
"notes": [
{
"category": "description",
"text": "In Apache PDFBox 1.8.0 to 1.8.14 and 2.0.0RC1 to 2.0.10, a carefully crafted (or fuzzed) file can trigger an infinite loop which leads to an out of memory exception in Apache PDFBox\u0027s AFMParser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While Fuse 6.3 and Fuse 7.0 ship vulnerable artifact via camel-pdfbox, however, the flawed code is not being used therefore no execution path leads to an exposure to this vulnerability, so both Fuse 6.3, 7 standalone are not affected. However, Fuse 7.0 on OpenShift ship vulnerable artifact via maven BOM, so setting Fuse 7.0 as affected for this reason only.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8036"
},
{
"category": "external",
"summary": "RHBZ#1597490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8036"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8036",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8036"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2018/06/29/1",
"url": "http://www.openwall.com/lists/oss-security/2018/06/29/1"
}
],
"release_date": "2018-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF"
},
{
"acknowledgments": [
{
"names": [
"Chris McCown"
]
}
],
"cve": "CVE-2018-8088",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2018-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1548909"
}
],
"notes": [
{
"category": "description",
"text": "An XML deserialization vulnerability was discovered in slf4j\u0027s EventData, which accepts an XML serialized string and can lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Subscription Asset Manager is now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates.\n\nThis issue did not affect the versions of Candlepin as shipped with Red Hat Satellite 6 as Candlepin uses slf4j-api and not the affected slf4j-ext (which is not on the Candlepin classpath).\n\nRed Hat Enterprise Virtualization Manager 4.1 is affected by this issue. Updated packages that address this issue are available through the Red Hat Enterprise Linux Server channels. Virtualization Manager hosts should be subscribed to these channels and obtain the updates via `yum update`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8088"
},
{
"category": "external",
"summary": "RHBZ#1548909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548909"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8088"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8088",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8088"
}
],
"release_date": "2018-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution"
},
{
"cve": "CVE-2018-1000129",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2018-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1559317"
}
],
"notes": [
{
"category": "description",
"text": "An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jolokia: Cross site scripting in the HTTP servlet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having security impact of Low for:\n* Red Hat OpenStack Platform 9.0 (Mitaka)\n* Red Hat OpenStack Platform 10.0 (Newton) \n* Red Hat OpenStack Platform 11.0 (Ocata)\n* Red Hat OpenStack Platform 12.0 (Pike)\n\nAlthough the affected code is present in shipped packages, data returned by Jolokia is correctly processed and invalid data is not used. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000129"
},
{
"category": "external",
"summary": "RHBZ#1559317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559317"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000129",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000129"
},
{
"category": "external",
"summary": "https://jolokia.org/#Security_fixes_with_1.5.0",
"url": "https://jolokia.org/#Security_fixes_with_1.5.0"
}
],
"release_date": "2018-02-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jolokia: Cross site scripting in the HTTP servlet"
},
{
"cve": "CVE-2018-1000130",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2018-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1559316"
}
],
"notes": [
{
"category": "description",
"text": "A JNDI Injection vulnerability exists in Jolokia agent version 1.3.7 in the proxy mode that allows a remote attacker to run arbitrary Java code on the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jolokia: JMX proxy mode vulnerable to remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For Red Hat OpenStack Platform, although the affected code is present in shipped packages, proxy mode is not enabled by default and the affected code is not used in any supported configuration of Red Hat OpenStack Platform. For this reason, the RHOSP impact as been reduced to Low and this issue is not currently planned to be addressed in future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000130"
},
{
"category": "external",
"summary": "RHBZ#1559316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559316"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000130"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000130",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000130"
},
{
"category": "external",
"summary": "https://jolokia.org/#Security_fixes_with_1.5.0",
"url": "https://jolokia.org/#Security_fixes_with_1.5.0"
}
],
"release_date": "2018-02-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jolokia: JMX proxy mode vulnerable to remote code execution"
},
{
"cve": "CVE-2018-1000180",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2018-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1588306"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in BouncyCastle. The number of iterations of the Miller-Rabin primality test was incorrectly calculated (according to FIPS 186-4 C.3). Under some circumstances, this could lead to the generation of weak RSA key pairs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: flaw in the low-level interface to RSA key pair generator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nRed Hat Satellite 6.5 isn\u0027t vulnerable to this issue, since it doesn\u0027t ship bouncycastle jar file anymore.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000180"
},
{
"category": "external",
"summary": "RHBZ#1588306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000180"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000180",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000180"
}
],
"release_date": "2018-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-11T07:53:47+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: flaw in the low-level interface to RSA key pair generator"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.