var-201801-0036
Vulnerability from variot
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. jQuery Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. JQuery is prone to a cross-site-scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Versions prior to JQuery 3.0.0 are vulnerable. jQuery is an open source, cross-browser JavaScript library developed by American John Resig programmers. The library simplifies the operation between HTML and JavaScript, and has the characteristics of modularization and plug-in extension. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. JIRA issues fixed (https://issues.jboss.org/):
JBEAP-23864 - (7.4.z) Upgrade xmlsec from 2.1.7.redhat-00001 to 2.2.3.redhat-00001 JBEAP-23865 - GSS Upgrade Apache CXF from 3.3.13.redhat-00001 to 3.4.10.redhat-00001 JBEAP-23866 - (7.4.z) Upgrade wss4j from 2.2.7.redhat-00001 to 2.3.3.redhat-00001 JBEAP-23928 - Tracker bug for the EAP 7.4.9 release for RHEL-9 JBEAP-24055 - (7.4.z) Upgrade HAL from 3.3.15.Final-redhat-00001 to 3.3.16.Final-redhat-00001 JBEAP-24081 - (7.4.z) Upgrade Elytron from 1.15.14.Final-redhat-00001 to 1.15.15.Final-redhat-00001 JBEAP-24095 - (7.4.z) Upgrade elytron-web from 1.9.2.Final-redhat-00001 to 1.9.3.Final-redhat-00001 JBEAP-24100 - GSS Upgrade Undertow from 2.2.20.SP1-redhat-00001 to 2.2.22.SP3-redhat-00001 JBEAP-24127 - (7.4.z) UNDERTOW-2123 - Update AsyncContextImpl.dispatch to use proper value JBEAP-24128 - (7.4.z) Upgrade Hibernate Search from 5.10.7.Final-redhat-00001 to 5.10.13.Final-redhat-00001 JBEAP-24132 - GSS Upgrade Ironjacamar from 1.5.3.SP2-redhat-00001 to 1.5.10.Final-redhat-00001 JBEAP-24147 - (7.4.z) Upgrade jboss-ejb-client from 4.0.45.Final-redhat-00001 to 4.0.49.Final-redhat-00001 JBEAP-24167 - (7.4.z) Upgrade WildFly Core from 15.0.19.Final-redhat-00001 to 15.0.21.Final-redhat-00002 JBEAP-24191 - GSS Upgrade remoting from 5.0.26.SP1-redhat-00001 to 5.0.27.Final-redhat-00001 JBEAP-24195 - GSS Upgrade JSF API from 3.0.0.SP06-redhat-00001 to 3.0.0.SP07-redhat-00001 JBEAP-24207 - (7.4.z) Upgrade Soteria from 1.0.1.redhat-00002 to 1.0.1.redhat-00003 JBEAP-24248 - (7.4.z) ELY-2492 - Upgrade sshd-common in Elytron from 2.7.0 to 2.9.2 JBEAP-24426 - (7.4.z) Upgrade Elytron from 1.15.15.Final-redhat-00001 to 1.15.16.Final-redhat-00001 JBEAP-24427 - (7.4.z) Upgrade WildFly Core from 15.0.21.Final-redhat-00002 to 15.0.22.Final-redhat-00001
- Description:
Red Hat Fuse provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat A-MQ is a standards compliant messaging system that is tailored for use in mission critical applications. It includes bug fixes, which are documented in the patch notes accompanying the package on the download page. See the download link given in the references section below. Solution:
Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
Installation instructions are located in the download section of the customer portal.
The References section of this erratum contains a download link (you must log in to download the update). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update Advisory ID: RHSA-2020:4670-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:4670 Issue date: 2020-11-03 CVE Names: CVE-2015-9251 CVE-2016-10735 CVE-2018-14040 CVE-2018-14042 CVE-2018-20676 CVE-2018-20677 CVE-2019-8331 CVE-2019-11358 CVE-2020-1722 CVE-2020-11022 ==================================================================== 1. Summary:
An update for the idm:DL1 and idm:client modules is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
- Description:
Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877)
Security Fix(es):
-
js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
-
bootstrap: XSS in the data-target attribute (CVE-2016-10735)
-
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
-
bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
-
bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676)
-
bootstrap: XSS in the affix configuration target property (CVE-2018-20677)
-
bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
-
js-jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
-
jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
-
ipa: No password length restriction leads to denial of service (CVE-2020-1722)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1399546 - CVE-2015-9251 jquery: Cross-site scripting via cross-domain ajax requests 1430365 - [RFE] Host-group names command rename 1488732 - fake_mname in named.conf is no longer effective 1585020 - Enable compat tree to provide information about AD users and groups on trust agents 1601614 - CVE-2018-14040 bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute 1601617 - CVE-2018-14042 bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip 1651577 - [WebUI] IPA Error 3007: RequirmentError" while adding members in "User ID overrides" tab 1668082 - CVE-2018-20676 bootstrap: XSS in the tooltip data-viewport attribute 1668089 - CVE-2018-20677 bootstrap: XSS in the affix configuration target property 1668097 - CVE-2016-10735 bootstrap: XSS in the data-target attribute 1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute 1701233 - [RFE] support setting supported signature methods on the token 1701972 - CVE-2019-11358 jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection 1746830 - Memory leak during search of idview overrides 1750893 - Memory leak when slapi-nis return entries retrieved from nsswitch 1751295 - When sync-repl is enabled, slapi-nis can deadlock during retrochanglog trimming 1757045 - IDM Web GUI / IPA web UI: the ID override operation doesn't work in GUI (it works only from CLI) 1759888 - Rebase OpenDNSSEC to 2.1 1768156 - ERR - schemacompat - map rdlock: old way MAP_MONITOR_DISABLED 1777806 - When Service weight is set as 0 for server in IPA location "IPA Error 903: InternalError" is displayed 1793071 - CVE-2020-1722 ipa: No password length restriction leads to denial of service 1801698 - [RFE] Changing default hostgroup is too easy 1802471 - SELinux policy for ipa-custodia 1809835 - RFE: ipa group-add-member: number of failed should also be emphasized 1810154 - RFE: ipa-backup should compare locally and globally installed server roles 1810179 - ipa-client-install should name authselect backups and restore to that at uninstall time 1813330 - ipa-restore does not restart httpd 1816784 - KRA install fails if all KRA members are Hidden Replicas 1818765 - [Rebase] Rebase ipa to 4.8.6+ 1818877 - [Rebase] Rebase to softhsm 2.6.0+ 1828406 - CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method 1831732 - AVC avc: denied { dac_override } for comm="ods-enforcerd 1831935 - AD authentication with IdM against SQL Server 1832331 - [abrt] [faf] 389-ds-base: unknown function(): /usr/sbin/ns-slapd killed by 11 1833266 - [dirsrv] set 'nsslapd-enable-upgrade-hash: off' as this raises warnings 1834264 - BIND rebase: rebuild against new so version 1834909 - softhsm use-after-free on process exit 1845211 - Rebase bind-dyndb-ldap to 11.3 1845537 - IPA bind configuration issue 1845596 - ipa trust-add fails with 'Fetching domains from trusted forest failed' 1846352 - cannot issue certs with multiple IP addresses corresponding to different hosts 1846434 - Remove ipa-idoverride-memberof as superceded by ipa-server 4.8.7 1847999 - EPN does not ship its default configuration ( /etc/ipa/epn.conf ) in freeipa-client-epn 1849914 - FreeIPA - Utilize 256-bit AJP connector passwords 1851411 - ipa: typo issue in ipanthomedirectoryrive deffinition 1852244 - ipa-healthcheck inadvertently obsoleted in RHEL 8.2 1853263 - ipa-selinux package missing 1857157 - replica install failing with avc denial for custodia component 1858318 - AttributeError: module 'ssl' has no attribute 'SSLCertVerificationError' when upgrading ca-less ipa master 1859213 - AVC denial during ipa-adtrust-install --add-agents 1863079 - ipa-epn command displays 'exception: ConnectionRefusedError: [Errno 111] Connection refused' 1863616 - CA-less install does not set required permissions on KDC certificate 1866291 - EPN: enhance input validation 1866938 - ipa-epn fails to retrieve user data if some user attributes are not present 1868432 - Unhandled Python exception in '/usr/libexec/ipa/ipa-pki-retrieve-key' 1869311 - ipa trust-add fails with 'Fetching domains from trusted forest failed' 1870202 - File permissions of /etc/ipa/ca.crt differ between CA-ful and CA-less 1874015 - ipa hbacrule-add-service --hbacsvcs=sshd is not applied successfully for subdomain 1875348 - Valgrind reports a memory leak in the Schema Compatibility plugin. 1879604 - pkispawn logs files are empty
- Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source: bind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.src.rpm custodia-0.6.0-3.module+el8.1.0+4098+f286395e.src.rpm ipa-4.8.7-12.module+el8.3.0+8222+c1bff54a.src.rpm ipa-4.8.7-12.module+el8.3.0+8223+6212645f.src.rpm ipa-healthcheck-0.4-6.module+el8.3.0+7710+e2408ce4.src.rpm ipa-healthcheck-0.4-6.module+el8.3.0+7711+c4441980.src.rpm opendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.src.rpm python-jwcrypto-0.5.0-1.module+el8.1.0+4098+f286395e.src.rpm python-jwcrypto-0.5.0-1.module+el8.1.0+4107+4a66eb87.src.rpm python-kdcproxy-0.4-5.module+el8.2.0+4691+a05b2456.src.rpm python-qrcode-5.1-12.module+el8.1.0+4098+f286395e.src.rpm python-qrcode-5.1-12.module+el8.1.0+4107+4a66eb87.src.rpm python-yubico-1.3.2-9.module+el8.1.0+4098+f286395e.src.rpm python-yubico-1.3.2-9.module+el8.1.0+4107+4a66eb87.src.rpm pyusb-1.0.0-9.module+el8.1.0+4098+f286395e.src.rpm pyusb-1.0.0-9.module+el8.1.0+4107+4a66eb87.src.rpm slapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.src.rpm softhsm-2.6.0-3.module+el8.3.0+6909+fb33717d.src.rpm
aarch64: bind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.aarch64.rpm bind-dyndb-ldap-debuginfo-11.3-1.module+el8.3.0+6993+104f8db0.aarch64.rpm bind-dyndb-ldap-debugsource-11.3-1.module+el8.3.0+6993+104f8db0.aarch64.rpm ipa-client-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-client-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm ipa-client-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-client-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm ipa-client-epn-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-client-epn-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm ipa-client-samba-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-client-samba-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm ipa-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm ipa-debugsource-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-debugsource-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm ipa-server-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-server-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-server-trust-ad-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm ipa-server-trust-ad-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm opendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.aarch64.rpm opendnssec-debuginfo-2.1.6-2.module+el8.3.0+6580+328a3362.aarch64.rpm opendnssec-debugsource-2.1.6-2.module+el8.3.0+6580+328a3362.aarch64.rpm slapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.aarch64.rpm slapi-nis-debuginfo-0.56.5-4.module+el8.3.0+8222+c1bff54a.aarch64.rpm slapi-nis-debugsource-0.56.5-4.module+el8.3.0+8222+c1bff54a.aarch64.rpm softhsm-2.6.0-3.module+el8.3.0+6909+fb33717d.aarch64.rpm softhsm-debuginfo-2.6.0-3.module+el8.3.0+6909+fb33717d.aarch64.rpm softhsm-debugsource-2.6.0-3.module+el8.3.0+6909+fb33717d.aarch64.rpm softhsm-devel-2.6.0-3.module+el8.3.0+6909+fb33717d.aarch64.rpm
noarch: custodia-0.6.0-3.module+el8.1.0+4098+f286395e.noarch.rpm ipa-client-common-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm ipa-client-common-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm ipa-common-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm ipa-common-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm ipa-healthcheck-0.4-6.module+el8.3.0+7710+e2408ce4.noarch.rpm ipa-healthcheck-core-0.4-6.module+el8.3.0+7710+e2408ce4.noarch.rpm ipa-healthcheck-core-0.4-6.module+el8.3.0+7711+c4441980.noarch.rpm ipa-python-compat-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm ipa-python-compat-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm ipa-selinux-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm ipa-selinux-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm ipa-server-common-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm ipa-server-dns-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm python3-custodia-0.6.0-3.module+el8.1.0+4098+f286395e.noarch.rpm python3-ipaclient-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm python3-ipaclient-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm python3-ipalib-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm python3-ipalib-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm python3-ipaserver-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm python3-jwcrypto-0.5.0-1.module+el8.1.0+4098+f286395e.noarch.rpm python3-jwcrypto-0.5.0-1.module+el8.1.0+4107+4a66eb87.noarch.rpm python3-kdcproxy-0.4-5.module+el8.2.0+4691+a05b2456.noarch.rpm python3-pyusb-1.0.0-9.module+el8.1.0+4098+f286395e.noarch.rpm python3-pyusb-1.0.0-9.module+el8.1.0+4107+4a66eb87.noarch.rpm python3-qrcode-5.1-12.module+el8.1.0+4098+f286395e.noarch.rpm python3-qrcode-5.1-12.module+el8.1.0+4107+4a66eb87.noarch.rpm python3-qrcode-core-5.1-12.module+el8.1.0+4098+f286395e.noarch.rpm python3-qrcode-core-5.1-12.module+el8.1.0+4107+4a66eb87.noarch.rpm python3-yubico-1.3.2-9.module+el8.1.0+4098+f286395e.noarch.rpm python3-yubico-1.3.2-9.module+el8.1.0+4107+4a66eb87.noarch.rpm
ppc64le: bind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.ppc64le.rpm bind-dyndb-ldap-debuginfo-11.3-1.module+el8.3.0+6993+104f8db0.ppc64le.rpm bind-dyndb-ldap-debugsource-11.3-1.module+el8.3.0+6993+104f8db0.ppc64le.rpm ipa-client-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-client-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm ipa-client-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-client-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm ipa-client-epn-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-client-epn-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm ipa-client-samba-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-client-samba-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm ipa-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm ipa-debugsource-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-debugsource-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm ipa-server-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-server-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-server-trust-ad-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm ipa-server-trust-ad-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm opendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.ppc64le.rpm opendnssec-debuginfo-2.1.6-2.module+el8.3.0+6580+328a3362.ppc64le.rpm opendnssec-debugsource-2.1.6-2.module+el8.3.0+6580+328a3362.ppc64le.rpm slapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.ppc64le.rpm slapi-nis-debuginfo-0.56.5-4.module+el8.3.0+8222+c1bff54a.ppc64le.rpm slapi-nis-debugsource-0.56.5-4.module+el8.3.0+8222+c1bff54a.ppc64le.rpm softhsm-2.6.0-3.module+el8.3.0+6909+fb33717d.ppc64le.rpm softhsm-debuginfo-2.6.0-3.module+el8.3.0+6909+fb33717d.ppc64le.rpm softhsm-debugsource-2.6.0-3.module+el8.3.0+6909+fb33717d.ppc64le.rpm softhsm-devel-2.6.0-3.module+el8.3.0+6909+fb33717d.ppc64le.rpm
s390x: bind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.s390x.rpm bind-dyndb-ldap-debuginfo-11.3-1.module+el8.3.0+6993+104f8db0.s390x.rpm bind-dyndb-ldap-debugsource-11.3-1.module+el8.3.0+6993+104f8db0.s390x.rpm ipa-client-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-client-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm ipa-client-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-client-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm ipa-client-epn-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-client-epn-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm ipa-client-samba-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-client-samba-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm ipa-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm ipa-debugsource-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-debugsource-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm ipa-server-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-server-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-server-trust-ad-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm ipa-server-trust-ad-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm opendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.s390x.rpm opendnssec-debuginfo-2.1.6-2.module+el8.3.0+6580+328a3362.s390x.rpm opendnssec-debugsource-2.1.6-2.module+el8.3.0+6580+328a3362.s390x.rpm slapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.s390x.rpm slapi-nis-debuginfo-0.56.5-4.module+el8.3.0+8222+c1bff54a.s390x.rpm slapi-nis-debugsource-0.56.5-4.module+el8.3.0+8222+c1bff54a.s390x.rpm softhsm-2.6.0-3.module+el8.3.0+6909+fb33717d.s390x.rpm softhsm-debuginfo-2.6.0-3.module+el8.3.0+6909+fb33717d.s390x.rpm softhsm-debugsource-2.6.0-3.module+el8.3.0+6909+fb33717d.s390x.rpm softhsm-devel-2.6.0-3.module+el8.3.0+6909+fb33717d.s390x.rpm
x86_64: bind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.x86_64.rpm bind-dyndb-ldap-debuginfo-11.3-1.module+el8.3.0+6993+104f8db0.x86_64.rpm bind-dyndb-ldap-debugsource-11.3-1.module+el8.3.0+6993+104f8db0.x86_64.rpm ipa-client-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-client-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm ipa-client-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-client-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm ipa-client-epn-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-client-epn-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm ipa-client-samba-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-client-samba-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm ipa-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm ipa-debugsource-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-debugsource-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm ipa-server-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-server-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-server-trust-ad-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm ipa-server-trust-ad-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm opendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.x86_64.rpm opendnssec-debuginfo-2.1.6-2.module+el8.3.0+6580+328a3362.x86_64.rpm opendnssec-debugsource-2.1.6-2.module+el8.3.0+6580+328a3362.x86_64.rpm slapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.x86_64.rpm slapi-nis-debuginfo-0.56.5-4.module+el8.3.0+8222+c1bff54a.x86_64.rpm slapi-nis-debugsource-0.56.5-4.module+el8.3.0+8222+c1bff54a.x86_64.rpm softhsm-2.6.0-3.module+el8.3.0+6909+fb33717d.x86_64.rpm softhsm-debuginfo-2.6.0-3.module+el8.3.0+6909+fb33717d.x86_64.rpm softhsm-debugsource-2.6.0-3.module+el8.3.0+6909+fb33717d.x86_64.rpm softhsm-devel-2.6.0-3.module+el8.3.0+6909+fb33717d.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-9251 https://access.redhat.com/security/cve/CVE-2016-10735 https://access.redhat.com/security/cve/CVE-2018-14040 https://access.redhat.com/security/cve/CVE-2018-14042 https://access.redhat.com/security/cve/CVE-2018-20676 https://access.redhat.com/security/cve/CVE-2018-20677 https://access.redhat.com/security/cve/CVE-2019-8331 https://access.redhat.com/security/cve/CVE-2019-11358 https://access.redhat.com/security/cve/CVE-2020-1722 https://access.redhat.com/security/cve/CVE-2020-11022 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBX6I0xtzjgjWX9erEAQioFw/+IiVoE8tPMkiNgSNrk05OezzG/Cev8wXY mTJ+clSxujruzDZ1GyYz5Ua5v4+fwEHbTKVHiite3HKbYGgV9E5H9Y/JVR75rbPN mIfAOLmvYDp3JeHT3RBqRrtviz2UaWRTmE8E30EoC0C912w0NHpwS3fhuRmJov1X lflTtWlQCuPE/7yFQEZqYYjmKMqAVeDk4K6smM/aTzMyM+uFgaksiSTrLzU0mcHJ AAn9h59qlwUXNGRbyBCoLMJrKq5Sw1+xz518XIIjJOQDJbSqu8syzKgi/qSFuLRp 2c/OSKJ98CVoiCcyhsBW/c3B6eoDmSfeKqt6JwVH/Sva+d7Oj5vpWTB5GW4hDFFh t3cuhvyavPnyAzxRnYw5syn/RTyjaOK1U6+6SbEtJVnlx9+FW0lKs/Pcx2ocYmfO UCDXHgxmEP8DTKwJZyIZtybVkpqbXh6jf69NLROTTZMtEwJzE1NGG4ulcl6tutTq S0gchuiUuxItZlD3a9ISBXXxV0iqqd7I5p78maohzIwfyZR13S++rFt7JnoVb7SO DECfEs6VinGH0Z0YInceF6Y9N+SURBrcQpQK12/wtGSChFFU83FII2sxy6iG7pTF HPTzByu+aYgFpuEF4EKSrDlZCVJ8Es5lyp+cF401o3oGJuNo9WYScKjb51a0+SLJ zbmM3GoiGZI=QyyK -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Security Fix(es):
-
HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
-
HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
-
HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
-
HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
-
HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
-
HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
-
HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
-
infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)
-
spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)
-
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
-
jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)
-
xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)
-
js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
-
logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)
-
js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)
-
apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)
-
spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)
-
undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)
-
shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)
-
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. 1725807 - CVE-2019-12384 jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution 1728993 - CVE-2019-11272 spring-security-core: mishandling of user passwords allows logging in with a password of NULL 1730316 - CVE-2019-3802 spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher 1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth 1735741 - CVE-2019-9513 HTTP/2: flood using PRIORITY frames results in excessive resource consumption 1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth 1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth 1735749 - CVE-2019-9518 HTTP/2: flood using empty frames results in excessive resource consumption 1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution 1741864 - CVE-2019-9516 HTTP/2: 0-length headers lead to denial of service 1741868 - CVE-2019-9517 HTTP/2: request for large response leads to denial of service 1752962 - CVE-2019-14439 jackson-databind: Polymorphic typing issue related to logback/JNDI 1774726 - CVE-2019-12422 shiro: Cookie padding oracle vulnerability with default configuration 1775193 - CVE-2019-17570 xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response
5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0036", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "weblogic server", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.2.1.3" }, { "model": "weblogic server", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.1.3.0" }, { "model": "service bus", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.2.1.3.0" }, { "model": "service bus", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.1.3.0.0" }, { "model": "retail workforce management software", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "1.60.9" }, { "model": "retail sales audit", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "15.0" }, { "model": "retail invoice matching", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "15.0" }, { "model": "retail customer insights", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "16.0" }, { "model": "retail customer insights", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "15.0" }, { "model": "retail allocation", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "15.0.2" }, { "model": "primavera unifier", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "18.8" }, { "model": "primavera unifier", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "16.2" }, { "model": "primavera unifier", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "16.1" }, { "model": "primavera gateway", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "17.12" }, { "model": "primavera gateway", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "16.2" }, { "model": "primavera gateway", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "15.2" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "8.57" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "8.56" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "8.55" }, { "model": "oss support tools", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "19.1" }, { "model": "jdeveloper", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.2.1.3.0" }, { "model": "jdeveloper", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.1.3.0.0" }, { "model": "jdeveloper", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "11.1.1.9.0" }, { "model": "jd edwards enterpriseone tools", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "9.2" }, { "model": "insurance insbridge rating and underwriting", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "5.5" }, { "model": "insurance insbridge rating and underwriting", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "5.4" }, { "model": "insurance insbridge rating and underwriting", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "5.2" }, { "model": "hospitality materials control", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "18.1" }, { "model": "hospitality guest access", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "4.2.1" }, { "model": "healthcare foundation", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "7.2" }, { "model": "healthcare foundation", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "7.1" }, { "model": "fusion middleware mapviewer", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.2.1.3.0" }, { "model": "financial services reconciliation framework", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "8.0.6" }, { "model": "financial services reconciliation framework", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services market risk measurement and management", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "8.0.6" }, { "model": "financial services market risk measurement and management", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "enterprise operations monitor", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "4.0" }, { "model": "enterprise operations monitor", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "3.4" }, { "model": "enterprise manager ops center", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.3.3" }, { "model": "enterprise manager ops center", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.2.2" }, { "model": "communications interactive session recorder", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6.2" }, { "model": "communications interactive session recorder", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6.1" }, { "model": "communications interactive session recorder", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6.0" }, { "model": "business process management suite", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.2.1.3.0" }, { "model": "business process management suite", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "12.1.3.0.0" }, { "model": "business process management suite", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "11.1.1.9.0" }, { "model": "banking platform", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "2.6.2" }, { "model": "banking platform", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "2.6.1" }, { "model": "agile product lifecycle management for process", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6.2.3.1" }, { "model": "agile product lifecycle management for process", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6.2.3.0" }, { "model": "agile product lifecycle management for process", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6.2.2.0" }, { "model": "agile product lifecycle management for process", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6.2.1.0" }, { "model": "agile product lifecycle management for process", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6.2.0.0" }, { "model": "endeca information discovery studio", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "3.2.0" }, { "model": "financial services loan loss forecasting and provisioning", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.7" }, { "model": "hospitality cruise fleet management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "9.0.11" }, { "model": "financial services asset liability management", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.7" }, { "model": "financial services profitability management", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.6" }, { "model": "financial services profitability management", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services analytical applications infrastructure", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "7.3.5" }, { "model": "utilities framework", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "4.3.0.4" }, { "model": "financial services asset liability management", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.4" }, { "model": "banking platform", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "2.6.0" }, { "model": "financial services data integration hub", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.7" }, { "model": "healthcare translational research", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "3.1.0" }, { "model": "hospitality guest access", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "4.2.0" }, { "model": "communications converged application server", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "7.0.0.1" }, { "model": "endeca information discovery studio", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "3.1.0" }, { "model": "siebel ui framework", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "18.10" }, { "model": "utilities framework", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "4.3.0.1" }, { "model": "financial services funds transfer pricing", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.7" }, { "model": "hospitality reporting and analytics", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "9.1.0" }, { "model": "primavera unifier", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "17.1" }, { "model": "primavera unifier", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "17.12" }, { "model": "jquery", "scope": "lt", "trust": 1.0, "vendor": "jquery", "version": "3.0.0" }, { "model": "utilities mobile workforce management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "2.3.0" }, { "model": "financial services loan loss forecasting and provisioning", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.2" }, { "model": "communications webrtc session controller", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "7.2" }, { "model": "financial services hedge management and ifrs valuations", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.7" }, { "model": "webcenter sites", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11.1.1.8.0" }, { "model": "retail workforce management software", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.64.0" }, { "model": "financial services data integration hub", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services analytical applications infrastructure", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.7" }, { "model": "financial services funds transfer pricing", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services liquidity risk management", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.2" }, { "model": "siebel ui framework", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "18.11" }, { "model": "financial services analytical applications infrastructure", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "7.3.3" }, { "model": "financial services liquidity risk management", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.6" }, { "model": "financial services hedge management and ifrs valuations", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.4" }, { "model": "communications services gatekeeper", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "6.1.0.4.0" }, { "model": "financial services analytical applications infrastructure", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.0" }, { "model": "real-time scheduler", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "2.3.0" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.6.3" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.6.2" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.6.1" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.4.2" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.8.1" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.8.0" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.7.2" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.7.1" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.6.4" }, { "model": "jquery", "scope": "eq", "trust": 0.9, "vendor": "jquery", "version": "1.6" }, { "model": "jquery", "scope": "eq", "trust": 0.8, "vendor": "jquery", "version": "3.0.0" }, { "model": "jquery", "scope": "eq", "trust": 0.8, "vendor": "jquery", "version": null }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.18.0" }, { "model": "utilities mobile workforce management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.3" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0.4" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0.3.0" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0.2.0" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0.1.0" }, { "model": "utilities framework", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0.1" }, { "model": "retail workforce management software", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.64" }, { "model": "real-time scheduler", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.3.0.0" }, { "model": "primavera unifier", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "17.7" }, { "model": "primavera unifier", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "17.12" }, { "model": "hospitality reporting and analytics", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "hospitality guest access", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2" }, { "model": "healthcare translational research", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.1" }, { "model": "financial services profitability management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.6" }, { "model": "financial services profitability management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services profitability management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services loan loss forecasting and provisioning", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.7" }, { "model": "financial services loan loss forecasting and provisioning", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services loan loss forecasting and provisioning", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services loan loss forecasting and provisioning", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.3" }, { "model": "financial services loan loss forecasting and provisioning", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.2" }, { "model": "financial services liquidity risk management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.6" }, { "model": "financial services liquidity risk management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services liquidity risk management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.2" }, { "model": "financial services hedge management and ifrs valuations", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.7" }, { "model": "financial services hedge management and ifrs valuations", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services hedge management and ifrs valuations", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services funds transfer pricing", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.7" }, { "model": "financial services funds transfer pricing", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services funds transfer pricing", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services data integration hub", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.7" }, { "model": "financial services data integration hub", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services asset liability management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.7" }, { "model": "financial services asset liability management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services asset liability management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.7" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.6" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.5" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.4" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.3" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.2" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0.1" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.0" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.3.5" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.3.4" }, { "model": "financial services analytical applications infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.3.3" }, { "model": "endeca information discovery studio", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2" }, { "model": "endeca information discovery studio", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.1" }, { "model": "diagnostic assistant", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.12" }, { "model": "communications webrtc session controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.1" }, { "model": "communications webrtc session controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.0" }, { "model": "communications converged application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.0" }, { "model": "communications application session controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.8" }, { "model": "communications application session controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.7.1" }, { "model": "business intelligence enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.4.0" }, { "model": "business intelligence enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.1.9.0" }, { "model": "banking platform", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.6" }, { "model": "jquery", "scope": "eq", "trust": 0.3, "vendor": "jquery", "version": "1.9" }, { "model": "jquery", "scope": "eq", "trust": 0.3, "vendor": "jquery", "version": "1.2.6" }, { "model": "jquery", "scope": "eq", "trust": 0.3, "vendor": "jquery", "version": "2.2" }, { "model": "jquery", "scope": "eq", "trust": 0.3, "vendor": "jquery", "version": "2.1" }, { "model": "intouch access anywhere update", "scope": "eq", "trust": 0.3, "vendor": "aveva", "version": "20172" }, { "model": "intouch access anywhere", "scope": "eq", "trust": 0.3, "vendor": "aveva", "version": "2017" }, { "model": "diagnostic assistant", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "2.12.36" }, { "model": "communications webrtc session controller", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "7.2" }, { "model": "communications converged application server", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "7.0.0.1" }, { "model": "jquery", "scope": "ne", "trust": 0.3, "vendor": "jquery", "version": "3.0" }, { "model": "intouch access anywhere update 2b", "scope": "ne", "trust": 0.3, "vendor": "aveva", "version": "2017" } ], "sources": [ { "db": "BID", "id": "105658" }, { "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "db": "CNNVD", "id": "CNNVD-201801-798" }, { "db": "NVD", "id": "CVE-2015-9251" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "John Martinelli,Red Hat,Oleg Gaidarenko,SECURELI.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-798" } ], "trust": 0.6 }, "cve": "CVE-2015-9251", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2015-9251", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-87212", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2015-9251", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-9251", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-9251", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201801-798", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-87212", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-87212" }, { "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "db": "CNNVD", "id": "CNNVD-201801-798" }, { "db": "NVD", "id": "CVE-2015-9251" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. jQuery Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. JQuery is prone to a cross-site-scripting vulnerability because it fails to sufficiently sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nVersions prior to JQuery 3.0.0 are vulnerable. jQuery is an open source, cross-browser JavaScript library developed by American John Resig programmers. The library simplifies the operation between HTML and JavaScript, and has the characteristics of modularization and plug-in extension. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. JIRA issues fixed (https://issues.jboss.org/):\n\nJBEAP-23864 - (7.4.z) Upgrade xmlsec from 2.1.7.redhat-00001 to 2.2.3.redhat-00001\nJBEAP-23865 - [GSS](7.4.z) Upgrade Apache CXF from 3.3.13.redhat-00001 to 3.4.10.redhat-00001\nJBEAP-23866 - (7.4.z) Upgrade wss4j from 2.2.7.redhat-00001 to 2.3.3.redhat-00001\nJBEAP-23928 - Tracker bug for the EAP 7.4.9 release for RHEL-9\nJBEAP-24055 - (7.4.z) Upgrade HAL from 3.3.15.Final-redhat-00001 to 3.3.16.Final-redhat-00001\nJBEAP-24081 - (7.4.z) Upgrade Elytron from 1.15.14.Final-redhat-00001 to 1.15.15.Final-redhat-00001\nJBEAP-24095 - (7.4.z) Upgrade elytron-web from 1.9.2.Final-redhat-00001 to 1.9.3.Final-redhat-00001\nJBEAP-24100 - [GSS](7.4.z) Upgrade Undertow from 2.2.20.SP1-redhat-00001 to 2.2.22.SP3-redhat-00001\nJBEAP-24127 - (7.4.z) UNDERTOW-2123 - Update AsyncContextImpl.dispatch to use proper value\nJBEAP-24128 - (7.4.z) Upgrade Hibernate Search from 5.10.7.Final-redhat-00001 to 5.10.13.Final-redhat-00001\nJBEAP-24132 - [GSS](7.4.z) Upgrade Ironjacamar from 1.5.3.SP2-redhat-00001 to 1.5.10.Final-redhat-00001\nJBEAP-24147 - (7.4.z) Upgrade jboss-ejb-client from 4.0.45.Final-redhat-00001 to 4.0.49.Final-redhat-00001\nJBEAP-24167 - (7.4.z) Upgrade WildFly Core from 15.0.19.Final-redhat-00001 to 15.0.21.Final-redhat-00002\nJBEAP-24191 - [GSS](7.4.z) Upgrade remoting from 5.0.26.SP1-redhat-00001 to 5.0.27.Final-redhat-00001\nJBEAP-24195 - [GSS](7.4.z) Upgrade JSF API from 3.0.0.SP06-redhat-00001 to 3.0.0.SP07-redhat-00001\nJBEAP-24207 - (7.4.z) Upgrade Soteria from 1.0.1.redhat-00002 to 1.0.1.redhat-00003\nJBEAP-24248 - (7.4.z) ELY-2492 - Upgrade sshd-common in Elytron from 2.7.0 to 2.9.2\nJBEAP-24426 - (7.4.z) Upgrade Elytron from 1.15.15.Final-redhat-00001 to 1.15.16.Final-redhat-00001\nJBEAP-24427 - (7.4.z) Upgrade WildFly Core from 15.0.21.Final-redhat-00002 to 15.0.22.Final-redhat-00001\n\n7. Description:\n\nRed Hat Fuse provides a small-footprint, flexible, open source enterprise\nservice bus and integration platform. Red Hat A-MQ is a standards compliant\nmessaging system that is tailored for use in mission critical applications. It\nincludes bug fixes, which are documented in the patch notes accompanying\nthe package on the download page. See the download link given in the\nreferences section below. Solution:\n\nBefore applying the update, back up your existing installation, including\nall applications, configuration files, databases and database settings, and\nso on. \n\nInstallation instructions are located in the download section of the\ncustomer portal. \n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update\nAdvisory ID: RHSA-2020:4670-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:4670\nIssue date: 2020-11-03\nCVE Names: CVE-2015-9251 CVE-2016-10735 CVE-2018-14040\n CVE-2018-14042 CVE-2018-20676 CVE-2018-20677\n CVE-2019-8331 CVE-2019-11358 CVE-2020-1722\n CVE-2020-11022\n====================================================================\n1. Summary:\n\nAn update for the idm:DL1 and idm:client modules is now available for Red\nHat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nRed Hat Identity Management (IdM) is a centralized authentication, identity\nmanagement, and authorization solution for both traditional and cloud-based\nenterprise environments. \n\nThe following packages have been upgraded to a later upstream version: ipa\n(4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765,\nBZ#1818877)\n\nSecurity Fix(es):\n\n* js-jquery: Cross-site scripting via cross-domain ajax requests\n(CVE-2015-9251)\n\n* bootstrap: XSS in the data-target attribute (CVE-2016-10735)\n\n* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent\nattribute (CVE-2018-14040)\n\n* bootstrap: Cross-site Scripting (XSS) in the data-container property of\ntooltip (CVE-2018-14042)\n\n* bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676)\n\n* bootstrap: XSS in the affix configuration target property\n(CVE-2018-20677)\n\n* bootstrap: XSS in the tooltip or popover data-template attribute\n(CVE-2019-8331)\n\n* js-jquery: Prototype pollution in object\u0027s prototype leading to denial of\nservice, remote code execution, or property injection (CVE-2019-11358)\n\n* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter\nmethod (CVE-2020-11022)\n\n* ipa: No password length restriction leads to denial of service\n(CVE-2020-1722)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.3 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1399546 - CVE-2015-9251 jquery: Cross-site scripting via cross-domain ajax requests\n1430365 - [RFE] Host-group names command rename\n1488732 - fake_mname in named.conf is no longer effective\n1585020 - Enable compat tree to provide information about AD users and groups on trust agents\n1601614 - CVE-2018-14040 bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute\n1601617 - CVE-2018-14042 bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip\n1651577 - [WebUI] IPA Error 3007: RequirmentError\" while adding members in \"User ID overrides\" tab\n1668082 - CVE-2018-20676 bootstrap: XSS in the tooltip data-viewport attribute\n1668089 - CVE-2018-20677 bootstrap: XSS in the affix configuration target property\n1668097 - CVE-2016-10735 bootstrap: XSS in the data-target attribute\n1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute\n1701233 - [RFE] support setting supported signature methods on the token\n1701972 - CVE-2019-11358 jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection\n1746830 - Memory leak during search of idview overrides\n1750893 - Memory leak when slapi-nis return entries retrieved from nsswitch\n1751295 - When sync-repl is enabled, slapi-nis can deadlock during retrochanglog trimming\n1757045 - IDM Web GUI / IPA web UI: the ID override operation doesn\u0027t work in GUI (it works only from CLI)\n1759888 - Rebase OpenDNSSEC to 2.1\n1768156 - ERR - schemacompat - map rdlock: old way MAP_MONITOR_DISABLED\n1777806 - When Service weight is set as 0 for server in IPA location \"IPA Error 903: InternalError\" is displayed\n1793071 - CVE-2020-1722 ipa: No password length restriction leads to denial of service\n1801698 - [RFE] Changing default hostgroup is too easy\n1802471 - SELinux policy for ipa-custodia\n1809835 - RFE: ipa group-add-member: number of failed should also be emphasized\n1810154 - RFE: ipa-backup should compare locally and globally installed server roles\n1810179 - ipa-client-install should name authselect backups and restore to that at uninstall time\n1813330 - ipa-restore does not restart httpd\n1816784 - KRA install fails if all KRA members are Hidden Replicas\n1818765 - [Rebase] Rebase ipa to 4.8.6+\n1818877 - [Rebase] Rebase to softhsm 2.6.0+\n1828406 - CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method\n1831732 - AVC avc: denied { dac_override } for comm=\"ods-enforcerd\n1831935 - AD authentication with IdM against SQL Server\n1832331 - [abrt] [faf] 389-ds-base: unknown function(): /usr/sbin/ns-slapd killed by 11\n1833266 - [dirsrv] set \u0027nsslapd-enable-upgrade-hash: off\u0027 as this raises warnings\n1834264 - BIND rebase: rebuild against new so version\n1834909 - softhsm use-after-free on process exit\n1845211 - Rebase bind-dyndb-ldap to 11.3\n1845537 - IPA bind configuration issue\n1845596 - ipa trust-add fails with \u0027Fetching domains from trusted forest failed\u0027\n1846352 - cannot issue certs with multiple IP addresses corresponding to different hosts\n1846434 - Remove ipa-idoverride-memberof as superceded by ipa-server 4.8.7\n1847999 - EPN does not ship its default configuration ( /etc/ipa/epn.conf ) in freeipa-client-epn\n1849914 - FreeIPA - Utilize 256-bit AJP connector passwords\n1851411 - ipa: typo issue in ipanthomedirectoryrive deffinition\n1852244 - ipa-healthcheck inadvertently obsoleted in RHEL 8.2\n1853263 - ipa-selinux package missing\n1857157 - replica install failing with avc denial for custodia component\n1858318 - AttributeError: module \u0027ssl\u0027 has no attribute \u0027SSLCertVerificationError\u0027 when upgrading ca-less ipa master\n1859213 - AVC denial during ipa-adtrust-install --add-agents\n1863079 - ipa-epn command displays \u0027exception: ConnectionRefusedError: [Errno 111] Connection refused\u0027\n1863616 - CA-less install does not set required permissions on KDC certificate\n1866291 - EPN: enhance input validation\n1866938 - ipa-epn fails to retrieve user data if some user attributes are not present\n1868432 - Unhandled Python exception in \u0027/usr/libexec/ipa/ipa-pki-retrieve-key\u0027\n1869311 - ipa trust-add fails with \u0027Fetching domains from trusted forest failed\u0027\n1870202 - File permissions of /etc/ipa/ca.crt differ between CA-ful and CA-less\n1874015 - ipa hbacrule-add-service --hbacsvcs=sshd is not applied successfully for subdomain\n1875348 - Valgrind reports a memory leak in the Schema Compatibility plugin. \n1879604 - pkispawn logs files are empty\n\n6. Package List:\n\nRed Hat Enterprise Linux AppStream (v. 8):\n\nSource:\nbind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.src.rpm\ncustodia-0.6.0-3.module+el8.1.0+4098+f286395e.src.rpm\nipa-4.8.7-12.module+el8.3.0+8222+c1bff54a.src.rpm\nipa-4.8.7-12.module+el8.3.0+8223+6212645f.src.rpm\nipa-healthcheck-0.4-6.module+el8.3.0+7710+e2408ce4.src.rpm\nipa-healthcheck-0.4-6.module+el8.3.0+7711+c4441980.src.rpm\nopendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.src.rpm\npython-jwcrypto-0.5.0-1.module+el8.1.0+4098+f286395e.src.rpm\npython-jwcrypto-0.5.0-1.module+el8.1.0+4107+4a66eb87.src.rpm\npython-kdcproxy-0.4-5.module+el8.2.0+4691+a05b2456.src.rpm\npython-qrcode-5.1-12.module+el8.1.0+4098+f286395e.src.rpm\npython-qrcode-5.1-12.module+el8.1.0+4107+4a66eb87.src.rpm\npython-yubico-1.3.2-9.module+el8.1.0+4098+f286395e.src.rpm\npython-yubico-1.3.2-9.module+el8.1.0+4107+4a66eb87.src.rpm\npyusb-1.0.0-9.module+el8.1.0+4098+f286395e.src.rpm\npyusb-1.0.0-9.module+el8.1.0+4107+4a66eb87.src.rpm\nslapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.src.rpm\nsofthsm-2.6.0-3.module+el8.3.0+6909+fb33717d.src.rpm\n\naarch64:\nbind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.aarch64.rpm\nbind-dyndb-ldap-debuginfo-11.3-1.module+el8.3.0+6993+104f8db0.aarch64.rpm\nbind-dyndb-ldap-debugsource-11.3-1.module+el8.3.0+6993+104f8db0.aarch64.rpm\nipa-client-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-client-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm\nipa-client-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-client-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm\nipa-client-epn-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-client-epn-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm\nipa-client-samba-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-client-samba-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm\nipa-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm\nipa-debugsource-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-debugsource-4.8.7-12.module+el8.3.0+8223+6212645f.aarch64.rpm\nipa-server-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-server-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-server-trust-ad-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nipa-server-trust-ad-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nopendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.aarch64.rpm\nopendnssec-debuginfo-2.1.6-2.module+el8.3.0+6580+328a3362.aarch64.rpm\nopendnssec-debugsource-2.1.6-2.module+el8.3.0+6580+328a3362.aarch64.rpm\nslapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nslapi-nis-debuginfo-0.56.5-4.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nslapi-nis-debugsource-0.56.5-4.module+el8.3.0+8222+c1bff54a.aarch64.rpm\nsofthsm-2.6.0-3.module+el8.3.0+6909+fb33717d.aarch64.rpm\nsofthsm-debuginfo-2.6.0-3.module+el8.3.0+6909+fb33717d.aarch64.rpm\nsofthsm-debugsource-2.6.0-3.module+el8.3.0+6909+fb33717d.aarch64.rpm\nsofthsm-devel-2.6.0-3.module+el8.3.0+6909+fb33717d.aarch64.rpm\n\nnoarch:\ncustodia-0.6.0-3.module+el8.1.0+4098+f286395e.noarch.rpm\nipa-client-common-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\nipa-client-common-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm\nipa-common-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\nipa-common-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm\nipa-healthcheck-0.4-6.module+el8.3.0+7710+e2408ce4.noarch.rpm\nipa-healthcheck-core-0.4-6.module+el8.3.0+7710+e2408ce4.noarch.rpm\nipa-healthcheck-core-0.4-6.module+el8.3.0+7711+c4441980.noarch.rpm\nipa-python-compat-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\nipa-python-compat-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm\nipa-selinux-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\nipa-selinux-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm\nipa-server-common-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\nipa-server-dns-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\npython3-custodia-0.6.0-3.module+el8.1.0+4098+f286395e.noarch.rpm\npython3-ipaclient-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\npython3-ipaclient-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm\npython3-ipalib-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\npython3-ipalib-4.8.7-12.module+el8.3.0+8223+6212645f.noarch.rpm\npython3-ipaserver-4.8.7-12.module+el8.3.0+8222+c1bff54a.noarch.rpm\npython3-jwcrypto-0.5.0-1.module+el8.1.0+4098+f286395e.noarch.rpm\npython3-jwcrypto-0.5.0-1.module+el8.1.0+4107+4a66eb87.noarch.rpm\npython3-kdcproxy-0.4-5.module+el8.2.0+4691+a05b2456.noarch.rpm\npython3-pyusb-1.0.0-9.module+el8.1.0+4098+f286395e.noarch.rpm\npython3-pyusb-1.0.0-9.module+el8.1.0+4107+4a66eb87.noarch.rpm\npython3-qrcode-5.1-12.module+el8.1.0+4098+f286395e.noarch.rpm\npython3-qrcode-5.1-12.module+el8.1.0+4107+4a66eb87.noarch.rpm\npython3-qrcode-core-5.1-12.module+el8.1.0+4098+f286395e.noarch.rpm\npython3-qrcode-core-5.1-12.module+el8.1.0+4107+4a66eb87.noarch.rpm\npython3-yubico-1.3.2-9.module+el8.1.0+4098+f286395e.noarch.rpm\npython3-yubico-1.3.2-9.module+el8.1.0+4107+4a66eb87.noarch.rpm\n\nppc64le:\nbind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.ppc64le.rpm\nbind-dyndb-ldap-debuginfo-11.3-1.module+el8.3.0+6993+104f8db0.ppc64le.rpm\nbind-dyndb-ldap-debugsource-11.3-1.module+el8.3.0+6993+104f8db0.ppc64le.rpm\nipa-client-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-client-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm\nipa-client-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-client-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm\nipa-client-epn-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-client-epn-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm\nipa-client-samba-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-client-samba-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm\nipa-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm\nipa-debugsource-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-debugsource-4.8.7-12.module+el8.3.0+8223+6212645f.ppc64le.rpm\nipa-server-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-server-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-server-trust-ad-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nipa-server-trust-ad-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nopendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.ppc64le.rpm\nopendnssec-debuginfo-2.1.6-2.module+el8.3.0+6580+328a3362.ppc64le.rpm\nopendnssec-debugsource-2.1.6-2.module+el8.3.0+6580+328a3362.ppc64le.rpm\nslapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nslapi-nis-debuginfo-0.56.5-4.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nslapi-nis-debugsource-0.56.5-4.module+el8.3.0+8222+c1bff54a.ppc64le.rpm\nsofthsm-2.6.0-3.module+el8.3.0+6909+fb33717d.ppc64le.rpm\nsofthsm-debuginfo-2.6.0-3.module+el8.3.0+6909+fb33717d.ppc64le.rpm\nsofthsm-debugsource-2.6.0-3.module+el8.3.0+6909+fb33717d.ppc64le.rpm\nsofthsm-devel-2.6.0-3.module+el8.3.0+6909+fb33717d.ppc64le.rpm\n\ns390x:\nbind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.s390x.rpm\nbind-dyndb-ldap-debuginfo-11.3-1.module+el8.3.0+6993+104f8db0.s390x.rpm\nbind-dyndb-ldap-debugsource-11.3-1.module+el8.3.0+6993+104f8db0.s390x.rpm\nipa-client-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-client-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm\nipa-client-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-client-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm\nipa-client-epn-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-client-epn-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm\nipa-client-samba-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-client-samba-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm\nipa-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm\nipa-debugsource-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-debugsource-4.8.7-12.module+el8.3.0+8223+6212645f.s390x.rpm\nipa-server-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-server-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-server-trust-ad-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nipa-server-trust-ad-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.s390x.rpm\nopendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.s390x.rpm\nopendnssec-debuginfo-2.1.6-2.module+el8.3.0+6580+328a3362.s390x.rpm\nopendnssec-debugsource-2.1.6-2.module+el8.3.0+6580+328a3362.s390x.rpm\nslapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.s390x.rpm\nslapi-nis-debuginfo-0.56.5-4.module+el8.3.0+8222+c1bff54a.s390x.rpm\nslapi-nis-debugsource-0.56.5-4.module+el8.3.0+8222+c1bff54a.s390x.rpm\nsofthsm-2.6.0-3.module+el8.3.0+6909+fb33717d.s390x.rpm\nsofthsm-debuginfo-2.6.0-3.module+el8.3.0+6909+fb33717d.s390x.rpm\nsofthsm-debugsource-2.6.0-3.module+el8.3.0+6909+fb33717d.s390x.rpm\nsofthsm-devel-2.6.0-3.module+el8.3.0+6909+fb33717d.s390x.rpm\n\nx86_64:\nbind-dyndb-ldap-11.3-1.module+el8.3.0+6993+104f8db0.x86_64.rpm\nbind-dyndb-ldap-debuginfo-11.3-1.module+el8.3.0+6993+104f8db0.x86_64.rpm\nbind-dyndb-ldap-debugsource-11.3-1.module+el8.3.0+6993+104f8db0.x86_64.rpm\nipa-client-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-client-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm\nipa-client-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-client-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm\nipa-client-epn-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-client-epn-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm\nipa-client-samba-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-client-samba-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm\nipa-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-debuginfo-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm\nipa-debugsource-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-debugsource-4.8.7-12.module+el8.3.0+8223+6212645f.x86_64.rpm\nipa-server-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-server-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-server-trust-ad-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nipa-server-trust-ad-debuginfo-4.8.7-12.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nopendnssec-2.1.6-2.module+el8.3.0+6580+328a3362.x86_64.rpm\nopendnssec-debuginfo-2.1.6-2.module+el8.3.0+6580+328a3362.x86_64.rpm\nopendnssec-debugsource-2.1.6-2.module+el8.3.0+6580+328a3362.x86_64.rpm\nslapi-nis-0.56.5-4.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nslapi-nis-debuginfo-0.56.5-4.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nslapi-nis-debugsource-0.56.5-4.module+el8.3.0+8222+c1bff54a.x86_64.rpm\nsofthsm-2.6.0-3.module+el8.3.0+6909+fb33717d.x86_64.rpm\nsofthsm-debuginfo-2.6.0-3.module+el8.3.0+6909+fb33717d.x86_64.rpm\nsofthsm-debugsource-2.6.0-3.module+el8.3.0+6909+fb33717d.x86_64.rpm\nsofthsm-devel-2.6.0-3.module+el8.3.0+6909+fb33717d.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-9251\nhttps://access.redhat.com/security/cve/CVE-2016-10735\nhttps://access.redhat.com/security/cve/CVE-2018-14040\nhttps://access.redhat.com/security/cve/CVE-2018-14042\nhttps://access.redhat.com/security/cve/CVE-2018-20676\nhttps://access.redhat.com/security/cve/CVE-2018-20677\nhttps://access.redhat.com/security/cve/CVE-2019-8331\nhttps://access.redhat.com/security/cve/CVE-2019-11358\nhttps://access.redhat.com/security/cve/CVE-2020-1722\nhttps://access.redhat.com/security/cve/CVE-2020-11022\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nzbmM3GoiGZI=QyyK\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \nThe purpose of this text-only errata is to inform you about the security\nissues fixed in this release. \n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth\n(CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource\nconsumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth\n(CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth\n(CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service\n(CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource\nconsumption (CVE-2019-9518)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to\ninvoke private methods (CVE-2019-10174)\n\n* spring-security-core: mishandling of user passwords allows logging in\nwith a password of NULL (CVE-2019-11272)\n\n* jackson-databind: failure to block the logback-core class from\npolymorphic deserialization leading to remote code execution\n(CVE-2019-12384)\n\n* jackson-databind: default typing mishandling leading to remote code\nexecution (CVE-2019-14379)\n\n* xmlrpc: Deserialization of server-side exception from faultCause in\nXMLRPC error response (CVE-2019-17570)\n\n* js-jquery: Cross-site scripting via cross-domain ajax requests\n(CVE-2015-9251)\n\n* logback: Serialization vulnerability in SocketServer and\nServerSocketReceiver (CVE-2017-5929)\n\n* js-jquery: XSS in responses from cross-origin ajax requests\n(CVE-2017-16012)\n\n* apache-commons-compress: ZipArchiveInputStream.read() fails to identify\ncorrect EOF allowing for DoS via crafted zip (CVE-2018-11771)\n\n* spring-data-api: potential information disclosure through maliciously\ncrafted example value in ExampleMatcher (CVE-2019-3802)\n\n* undertow: leak credentials to log files\nUndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* shiro: Cookie padding oracle vulnerability with default configuration\n(CVE-2019-12422)\n\n* jackson-databind: polymorphic typing issue allows attacker to read\narbitrary local files on the server via crafted JSON message. \n1725807 - CVE-2019-12384 jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution\n1728993 - CVE-2019-11272 spring-security-core: mishandling of user passwords allows logging in with a password of NULL\n1730316 - CVE-2019-3802 spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher\n1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth\n1735741 - CVE-2019-9513 HTTP/2: flood using PRIORITY frames results in excessive resource consumption\n1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth\n1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth\n1735749 - CVE-2019-9518 HTTP/2: flood using empty frames results in excessive resource consumption\n1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution\n1741864 - CVE-2019-9516 HTTP/2: 0-length headers lead to denial of service\n1741868 - CVE-2019-9517 HTTP/2: request for large response leads to denial of service\n1752962 - CVE-2019-14439 jackson-databind: Polymorphic typing issue related to logback/JNDI\n1774726 - CVE-2019-12422 shiro: Cookie padding oracle vulnerability with default configuration\n1775193 - CVE-2019-17570 xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response\n\n5", "sources": [ { "db": "NVD", "id": "CVE-2015-9251" }, { "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "db": "BID", "id": "105658" }, { "db": "VULHUB", "id": "VHN-87212" }, { "db": "PACKETSTORM", "id": "170819" }, { "db": "PACKETSTORM", "id": "170823" }, { "db": "PACKETSTORM", "id": "156315" }, { "db": "PACKETSTORM", "id": "159876" }, { "db": "PACKETSTORM", "id": "156941" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-9251", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-18-212-04", "trust": 2.8 }, { "db": "BID", "id": "105658", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "153237", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "156743", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "152787", "trust": 1.7 }, { "db": "TENABLE", "id": "TNS-2019-08", "trust": 1.7 }, { "db": "PULSESECURE", "id": "SA44601", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "156315", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "170823", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "156941", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96012689", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-008097", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "159353", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "159852", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "170821", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156630", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201801-798", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1016", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0832", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.0585", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3165", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3875", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1238", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.0583", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0494", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1512", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1519", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3267", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1299", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1076", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0465", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3902", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4294", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3368", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1225", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2525", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSMA-21-187-01", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-22-097-01", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "170819", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "159876", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "170817", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-98926", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-87212", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-87212" }, { "db": "BID", "id": "105658" }, { "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "db": "PACKETSTORM", "id": "170819" }, { "db": "PACKETSTORM", "id": "170823" }, { "db": "PACKETSTORM", "id": "156315" }, { "db": "PACKETSTORM", "id": "159876" }, { "db": "PACKETSTORM", "id": "156941" }, { "db": "CNNVD", "id": "CNNVD-201801-798" }, { "db": "NVD", "id": "CVE-2015-9251" } ] }, "id": "VAR-201801-0036", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-87212" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T22:33:43.707000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Mitigate\u00a0possible\u00a0XSS\u00a0vulnerability\u00a0#2588\u00a0(c254d30)", "trust": 0.8, "url": "https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc" }, { "title": "jQuery Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=77976" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "db": "CNNVD", "id": "CNNVD-201801-798" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.1 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-87212" }, { "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "db": "NVD", "id": "CVE-2015-9251" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.securityfocus.com/bid/105658" }, { "trust": 2.9, "url": "http://packetstormsecurity.com/files/152787/dotcms-5.1.1-vulnerable-dependencies.html" }, { "trust": 2.6, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2020:0481" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/153237/retirejs-cors-issue-script-execution.html" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/156743/octobercms-insecure-dependencies.html" }, { "trust": 2.3, "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "trust": 2.0, "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "trust": 2.0, "url": "https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc" }, { "trust": 2.0, "url": "https://github.com/jquery/jquery/pull/2588" }, { "trust": 2.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-212-04" }, { "trust": 2.0, "url": "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/securitybulletin_lfsec126.pdf" }, { "trust": 2.0, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 2.0, "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "trust": 1.7, "url": "https://seclists.org/bugtraq/2019/may/18" }, { "trust": 1.7, "url": "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa44601" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20210108-0004/" }, { "trust": 1.7, "url": "https://www.tenable.com/security/tns-2019-08" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2019/may/13" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2019/may/11" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2019/may/10" }, { "trust": 1.7, "url": "https://github.com/jquery/jquery/issues/2432" }, { "trust": 1.7, "url": "https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2" }, { "trust": 1.7, "url": "https://snyk.io/vuln/npm:jquery:20150627" }, { "trust": 1.7, "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "trust": 1.7, "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "trust": 1.7, "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "trust": 1.7, "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2020:0729" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-9251" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3cdev.flink.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3cissues.drill.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3cdev.drill.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3cuser.flink.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3cuser.flink.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3ccommits.roller.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3cdev.drill.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3cuser.flink.apache.org%3e" }, { "trust": 0.9, "url": "https://jquery.org/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96012689/" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-18-212-04" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3cdev.drill.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3cdev.drill.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3cissues.drill.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3cdev.flink.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3cuser.flink.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3cuser.flink.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3cuser.flink.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3ccommits.roller.apache.org%3e" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1105515" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1105509" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1105479" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1106577" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10874666" }, { "trust": 0.6, "url": "https://fortiguard.com/psirt/fg-ir-18-013" }, { "trust": 0.6, "url": "https://www.ibm.com/support/docview.wss?uid=ibm10967469" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-a-cross-site-scripting-vulnerability-in-jquery-affects-ibm-infosphere-information-server/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159353/red-hat-security-advisory-2020-3936-01.html" }, { "trust": 0.6, "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10878200" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-in-swagger-ui-affect-ibm-business-automation-workflow-and-ibm-business-process-manager-bpm/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilites-affect-ibm-jazz-foundation-and-ibm-engineering-products-5/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4294/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-cross-site-scripting-and-vulnerable-library-jquery-v1-11-1-affects-ibm-engineering-workflow-management/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-in-swagger-ui-affect-ibm-business-automation-workflow-and-ibm-business-process-manager-bpm-2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0465" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156630/red-hat-security-advisory-2020-0729-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78866" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156941/red-hat-security-advisory-2020-0983-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1105497" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3875/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1016/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1519" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3902/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0832/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/170821/red-hat-security-advisory-2023-0552-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.0585" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159852/red-hat-security-advisory-2020-4847-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2525" }, { "trust": 0.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=ibm10874666" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-10/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-8/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-187-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.0583" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-qradar-analyst-workflow-add-on-to-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-2/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerability-issues-affect-ibm-spectrum-symphony-7-3-1/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/79122" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0494/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78794" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156315/red-hat-security-advisory-2020-0481-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3267/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-097-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1076/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3368/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/170823/red-hat-security-advisory-2023-0553-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-affected-by-multiple-vulnerabilities-3/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3165/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1512" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2015-9251" }, { "trust": 0.5, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14040" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-14040" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14042" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-11022" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-10735" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2019-11358" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10735" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11022" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2019-8331" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-14042" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8331" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11358" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11023" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-40150" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3143" }, { "trust": 0.2, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-42003" }, { "trust": 0.2, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-42004" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14041" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40150" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-45047" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18214" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40152" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40149" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-40149" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11023" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-40152" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-14041" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-18214" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-45693" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-46364" }, { "trust": 0.2, "url": "https://issues.jboss.org/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-3143" }, { "trust": 0.2, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-10174" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10174" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2023:0554" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2023:0553" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.amq.broker\u0026downloadtype=securitypatches\u0026version=6.3.0" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.fuse\u0026downloadtype=securitypatches\u0026version=6.3" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1722" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-20676" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1722" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20676" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20677" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4670" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-20677" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9513" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9514" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9517" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10184" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14379" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9515" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11771" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5427" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9512" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9514" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12422" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3888" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9517" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9515" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5929" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14439" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9516" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9518" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11272" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17570" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3888" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9513" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17570" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=jboss.fuse\u0026version=7.6.0" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-5929" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-11771" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3802" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9512" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10184" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12384" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-15756" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-5427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15756" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-16012" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12384" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-11272" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9516" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3802" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9518" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16012" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:0983" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14379" } ], "sources": [ { "db": "VULHUB", "id": "VHN-87212" }, { "db": "BID", "id": "105658" }, { "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "db": "PACKETSTORM", "id": "170819" }, { "db": "PACKETSTORM", "id": "170823" }, { "db": "PACKETSTORM", "id": "156315" }, { "db": "PACKETSTORM", "id": "159876" }, { "db": "PACKETSTORM", "id": "156941" }, { "db": "CNNVD", "id": "CNNVD-201801-798" }, { "db": "NVD", "id": "CVE-2015-9251" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-87212" }, { "db": "BID", "id": "105658" }, { "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "db": "PACKETSTORM", "id": "170819" }, { "db": "PACKETSTORM", "id": "170823" }, { "db": "PACKETSTORM", "id": "156315" }, { "db": "PACKETSTORM", "id": "159876" }, { "db": "PACKETSTORM", "id": "156941" }, { "db": "CNNVD", "id": "CNNVD-201801-798" }, { "db": "NVD", "id": "CVE-2015-9251" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-87212" }, { "date": "2018-01-18T00:00:00", "db": "BID", "id": "105658" }, { "date": "2018-02-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "date": "2023-01-31T17:19:24", "db": "PACKETSTORM", "id": "170819" }, { "date": "2023-01-31T17:26:38", "db": "PACKETSTORM", "id": "170823" }, { "date": "2020-02-12T18:53:35", "db": "PACKETSTORM", "id": "156315" }, { "date": "2020-11-04T15:32:52", "db": "PACKETSTORM", "id": "159876" }, { "date": "2020-03-27T13:16:40", "db": "PACKETSTORM", "id": "156941" }, { "date": "2018-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-798" }, { "date": "2018-01-18T23:29:00.307000", "db": "NVD", "id": "CVE-2015-9251" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-08T00:00:00", "db": "VULHUB", "id": "VHN-87212" }, { "date": "2019-07-17T07:00:00", "db": "BID", "id": "105658" }, { "date": "2021-07-08T08:40:00", "db": "JVNDB", "id": "JVNDB-2015-008097" }, { "date": "2023-02-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-798" }, { "date": "2024-11-21T02:40:09.093000", "db": "NVD", "id": "CVE-2015-9251" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-798" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "jQuery\u00a0 Cross-site Scripting Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-008097" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "156315" }, { "db": "CNNVD", "id": "CNNVD-201801-798" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.