Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-19012 (GCVE-0-2019-19012)
Vulnerability from cvelistv5 – Published: 2019-11-16 15:30 – Updated: 2024-08-05 02:02- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T02:02:39.918Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/kkos/oniguruma/issues/164"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/tarantula-team/CVE-2019-19012"
},
{
"name": "FEDORA-2019-d942abd0d4",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"
},
{
"name": "[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"
},
{
"name": "FEDORA-2019-73197ff9a0",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"
},
{
"name": "USN-4460-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4460-1/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-08-24T13:06:06",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/kkos/oniguruma/issues/164"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/tarantula-team/CVE-2019-19012"
},
{
"name": "FEDORA-2019-d942abd0d4",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"
},
{
"name": "[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"
},
{
"name": "FEDORA-2019-73197ff9a0",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"
},
{
"name": "USN-4460-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4460-1/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-19012",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/kkos/oniguruma/issues/164",
"refsource": "MISC",
"url": "https://github.com/kkos/oniguruma/issues/164"
},
{
"name": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2",
"refsource": "MISC",
"url": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"
},
{
"name": "https://github.com/tarantula-team/CVE-2019-19012",
"refsource": "MISC",
"url": "https://github.com/tarantula-team/CVE-2019-19012"
},
{
"name": "FEDORA-2019-d942abd0d4",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"
},
{
"name": "[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"
},
{
"name": "FEDORA-2019-73197ff9a0",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"
},
{
"name": "USN-4460-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4460-1/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-19012",
"datePublished": "2019-11-16T15:30:47",
"dateReserved": "2019-11-16T00:00:00",
"dateUpdated": "2024-08-05T02:02:39.918Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-19012\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-11-17T18:15:11.440\",\"lastModified\":\"2024-11-21T04:33:59.490\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de enteros en la funci\u00f3n search_in_range en el archivo regexec.c en Oniguruma versiones 6.x anteriores a 6.9.4_rc2, conduce a una lectura fuera de l\u00edmites, en la que el desplazamiento de esta lectura est\u00e1 bajo el control de un atacante. (Esto solo afecta a la versi\u00f3n compilada de 32 bits). Los atacantes remotos pueden causar una denegaci\u00f3n de servicio o una divulgaci\u00f3n de informaci\u00f3n, o posiblemente tener otro impacto no especificado, por medio de una expresi\u00f3n regular especialmente dise\u00f1ada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"},{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.9.3\",\"matchCriteriaId\":\"FBFDAD06-A3DB-4161-9B88-D384E641705B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oniguruma_project:oniguruma:6.9.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0515AAEB-AD17-4E7F-91DE-D9FEC0C1602D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}],\"references\":[{\"url\":\"https://github.com/kkos/oniguruma/issues/164\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/tarantula-team/CVE-2019-19012\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4460-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/kkos/oniguruma/issues/164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/tarantula-team/CVE-2019-19012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4460-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
WID-SEC-W-2024-0218
Vulnerability from csaf_certbund - Published: 2024-01-25 23:00 - Updated: 2025-05-19 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, beliebigen Code auszuf\u00fchren oder sensible Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0218 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0218.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0218 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0218"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2024-01-25",
"url": "https://access.redhat.com/errata/RHSA-2024:0409"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2024-01-25",
"url": "https://access.redhat.com/errata/RHSA-2024:0410"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2024-01-25",
"url": "https://access.redhat.com/errata/RHSA-2024:0419"
},
{
"category": "external",
"summary": "DELL Security Update",
"url": "https://www.dell.com/support/kbdoc/de-de/000221476/dsa-2024-058-security-update-for-dell-networker-vproxy-multiple-components-vulnerabilities"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0572 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0572"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0571 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0571"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0578 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0578"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0769 vom 2024-02-12",
"url": "https://access.redhat.com/errata/RHSA-2024:0769"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0769 vom 2024-02-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-0769.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0889 vom 2024-02-20",
"url": "https://access.redhat.com/errata/RHSA-2024:0889"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0889 vom 2024-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2024-0889.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1090 vom 2024-03-05",
"url": "https://access.redhat.com/errata/RHSA-2024:1090"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:0769 vom 2024-03-12",
"url": "https://errata.build.resf.org/RLSA-2024:0769"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7148094 vom 2024-04-11",
"url": "https://www.ibm.com/support/pages/node/7148094"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2211 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2211"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:2211 vom 2025-05-07",
"url": "https://errata.build.resf.org/RLSA-2024:2211"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7539 vom 2025-05-14",
"url": "https://access.redhat.com/errata/RHSA-2025:7539"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7539 vom 2025-05-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-7539.html"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux\u0027s oniguruma, tcpslice, c-ares: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-19T22:00:00.000+00:00",
"generator": {
"date": "2025-05-20T07:42:29.310+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-0218",
"initial_release_date": "2024-01-25T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-01-25T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-28T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-01-30T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-02-11T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-02-13T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-02-20T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-03-05T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-03-12T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-04-11T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-07T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy\u003c19.9.0.4",
"product": {
"name": "Dell NetWorker vProxy\u003c19.9.0.4",
"product_id": "T032377"
}
},
{
"category": "product_version",
"name": "vProxy19.9.0.4",
"product": {
"name": "Dell NetWorker vProxy19.9.0.4",
"product_id": "T032377-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.9.0.4"
}
}
},
{
"category": "product_version_range",
"name": "vProxy\u003c19.10",
"product": {
"name": "Dell NetWorker vProxy\u003c19.10",
"product_id": "T032378"
}
},
{
"category": "product_version",
"name": "vProxy19.10",
"product": {
"name": "Dell NetWorker vProxy19.10",
"product_id": "T032378-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.10"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.5",
"product": {
"name": "IBM QRadar SIEM 7.5",
"product_id": "T022954",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version_range",
"name": "Oniguruma \u003c6.9.4_rc2",
"product": {
"name": "Red Hat Enterprise Linux Oniguruma \u003c6.9.4_rc2",
"product_id": "T032348"
}
},
{
"category": "product_version",
"name": "Oniguruma 6.9.4_rc2",
"product": {
"name": "Red Hat Enterprise Linux Oniguruma 6.9.4_rc2",
"product_id": "T032348-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:oniguruma__6.9.4_rc2"
}
}
},
{
"category": "product_version_range",
"name": "tcpslice \u003c1.5",
"product": {
"name": "Red Hat Enterprise Linux tcpslice \u003c1.5",
"product_id": "T032349"
}
},
{
"category": "product_version",
"name": "tcpslice 1.5",
"product": {
"name": "Red Hat Enterprise Linux tcpslice 1.5",
"product_id": "T032349-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:tcpslice__1.5"
}
}
},
{
"category": "product_version_range",
"name": "c-ares \u003c1.17.0",
"product": {
"name": "Red Hat Enterprise Linux c-ares \u003c1.17.0",
"product_id": "T032350"
}
},
{
"category": "product_version",
"name": "c-ares 1.17.0",
"product": {
"name": "Red Hat Enterprise Linux c-ares 1.17.0",
"product_id": "T032350-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:c-ares__1.17.0"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13224",
"product_status": {
"known_affected": [
"T022954",
"T032377",
"T032378",
"67646",
"T032348",
"T004914",
"T032255"
]
},
"release_date": "2024-01-25T23:00:00.000+00:00",
"title": "CVE-2019-13224"
},
{
"cve": "CVE-2019-16163",
"product_status": {
"known_affected": [
"T022954",
"T032377",
"T032378",
"67646",
"T032348",
"T004914",
"T032255"
]
},
"release_date": "2024-01-25T23:00:00.000+00:00",
"title": "CVE-2019-16163"
},
{
"cve": "CVE-2019-19012",
"product_status": {
"known_affected": [
"T022954",
"T032377",
"T032378",
"67646",
"T032348",
"T004914",
"T032255"
]
},
"release_date": "2024-01-25T23:00:00.000+00:00",
"title": "CVE-2019-19012"
},
{
"cve": "CVE-2019-19203",
"product_status": {
"known_affected": [
"T022954",
"T032377",
"T032378",
"67646",
"T032348",
"T004914",
"T032255"
]
},
"release_date": "2024-01-25T23:00:00.000+00:00",
"title": "CVE-2019-19203"
},
{
"cve": "CVE-2019-19204",
"product_status": {
"known_affected": [
"T022954",
"T032377",
"T032378",
"67646",
"T032348",
"T004914",
"T032255"
]
},
"release_date": "2024-01-25T23:00:00.000+00:00",
"title": "CVE-2019-19204"
},
{
"cve": "CVE-2021-41043",
"product_status": {
"known_affected": [
"T022954",
"T032377",
"T032378",
"67646",
"T032349",
"T004914",
"T032255"
]
},
"release_date": "2024-01-25T23:00:00.000+00:00",
"title": "CVE-2021-41043"
},
{
"cve": "CVE-2020-22217",
"product_status": {
"known_affected": [
"T022954",
"T032377",
"T032378",
"67646",
"T032350",
"T004914",
"T032255"
]
},
"release_date": "2024-01-25T23:00:00.000+00:00",
"title": "CVE-2020-22217"
}
]
}
WID-SEC-W-2024-1086
Vulnerability from csaf_certbund - Published: 2024-05-09 22:00 - Updated: 2025-10-19 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, seine Privilegien zu erweitern, einen Cross-Site-Scripting (XSS)-Angriff durchzuf\u00fchren oder einen nicht spezifizierten Angriff auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1086 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1086.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1086 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1086"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7150684 vom 2024-05-09",
"url": "https://www.ibm.com/support/pages/node/7150684"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7174015 vom 2024-10-24",
"url": "https://www.ibm.com/support/pages/node/7174015"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7183584 vom 2025-02-18",
"url": "https://www.ibm.com/support/pages/node/7183584"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
}
],
"source_lang": "en-US",
"title": "IBM QRadar SIEM: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-19T22:00:00.000+00:00",
"generator": {
"date": "2025-10-20T08:43:54.726+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1086",
"initial_release_date": "2024-05-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-24T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.5.0",
"product": {
"name": "IBM QRadar SIEM 7.5.0",
"product_id": "T023574",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP8 IF02",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP8 IF02",
"product_id": "T034673"
}
},
{
"category": "product_version",
"name": "7.5.0 UP8 IF02",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP8 IF02",
"product_id": "T034673-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up8_if02"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF01",
"product_id": "T041270"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF01",
"product_id": "T041270-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-4559",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2007-4559"
},
{
"cve": "CVE-2014-3146",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2014-3146"
},
{
"cve": "CVE-2018-19787",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2018-19787"
},
{
"cve": "CVE-2019-13224",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2019-13224"
},
{
"cve": "CVE-2019-16163",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2019-16163"
},
{
"cve": "CVE-2019-19012",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2019-19012"
},
{
"cve": "CVE-2019-19203",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2019-19203"
},
{
"cve": "CVE-2019-19204",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2019-19204"
},
{
"cve": "CVE-2019-8675",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2019-8675"
},
{
"cve": "CVE-2019-8696",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2019-8696"
},
{
"cve": "CVE-2020-10001",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2020-10001"
},
{
"cve": "CVE-2020-27783",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2020-27783"
},
{
"cve": "CVE-2020-3898",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2020-3898"
},
{
"cve": "CVE-2021-33631",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2021-33631"
},
{
"cve": "CVE-2021-43618",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2021-43618"
},
{
"cve": "CVE-2021-43818",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2021-43818"
},
{
"cve": "CVE-2021-43975",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2021-43975"
},
{
"cve": "CVE-2022-26691",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-26691"
},
{
"cve": "CVE-2022-28388",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-28388"
},
{
"cve": "CVE-2022-3545",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3594",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3640",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-36402",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-36402"
},
{
"cve": "CVE-2022-38096",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-38457",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-38457"
},
{
"cve": "CVE-2022-40133",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-40133"
},
{
"cve": "CVE-2022-40982",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-40982"
},
{
"cve": "CVE-2022-41858",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42895",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-45869",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-45869"
},
{
"cve": "CVE-2022-45884",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45887",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-4744",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-4744"
},
{
"cve": "CVE-2022-48560",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-48560"
},
{
"cve": "CVE-2022-48564",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-48564"
},
{
"cve": "CVE-2022-48624",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2022-48624"
},
{
"cve": "CVE-2023-0458",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-0458"
},
{
"cve": "CVE-2023-0590",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-1073",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1073"
},
{
"cve": "CVE-2023-1074",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1074"
},
{
"cve": "CVE-2023-1075",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1075"
},
{
"cve": "CVE-2023-1079",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1079"
},
{
"cve": "CVE-2023-1118",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1192",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1192"
},
{
"cve": "CVE-2023-1206",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1206"
},
{
"cve": "CVE-2023-1252",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1252"
},
{
"cve": "CVE-2023-1382",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1382"
},
{
"cve": "CVE-2023-1786",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1786"
},
{
"cve": "CVE-2023-1838",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1838"
},
{
"cve": "CVE-2023-1855",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1998",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-20569",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-2162",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2163",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-2163"
},
{
"cve": "CVE-2023-2166",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-2166"
},
{
"cve": "CVE-2023-2176",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-23455",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-2513",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-2513"
},
{
"cve": "CVE-2023-26545",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-26545"
},
{
"cve": "CVE-2023-27043",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28322",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28328",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28772",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-30456",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-30456"
},
{
"cve": "CVE-2023-31084",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3138",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-3141",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-31436",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-3161",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3161"
},
{
"cve": "CVE-2023-3212",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3212"
},
{
"cve": "CVE-2023-32324",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-32324"
},
{
"cve": "CVE-2023-32360",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-3268",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3268"
},
{
"cve": "CVE-2023-33203",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-33203"
},
{
"cve": "CVE-2023-33951",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-33951"
},
{
"cve": "CVE-2023-33952",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-33952"
},
{
"cve": "CVE-2023-34241",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-34241"
},
{
"cve": "CVE-2023-35823",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-35823"
},
{
"cve": "CVE-2023-35824",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-35824"
},
{
"cve": "CVE-2023-3609",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3609"
},
{
"cve": "CVE-2023-3611",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3772",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3772"
},
{
"cve": "CVE-2023-3812",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-3812"
},
{
"cve": "CVE-2023-38546",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-38546"
},
{
"cve": "CVE-2023-40283",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-40283"
},
{
"cve": "CVE-2023-4128",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4128"
},
{
"cve": "CVE-2023-4132",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4132"
},
{
"cve": "CVE-2023-4155",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4155"
},
{
"cve": "CVE-2023-4206",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4206"
},
{
"cve": "CVE-2023-4207",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4207"
},
{
"cve": "CVE-2023-4208",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4208"
},
{
"cve": "CVE-2023-42753",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-45862",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-45862"
},
{
"cve": "CVE-2023-45871",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-45871"
},
{
"cve": "CVE-2023-46218",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-4622",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4622"
},
{
"cve": "CVE-2023-4623",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4623"
},
{
"cve": "CVE-2023-46813",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-46813"
},
{
"cve": "CVE-2023-4732",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4732"
},
{
"cve": "CVE-2023-4921",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-4921"
},
{
"cve": "CVE-2023-50387",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-50387"
},
{
"cve": "CVE-2023-50868",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-51042",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-51042"
},
{
"cve": "CVE-2023-51043",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-51043"
},
{
"cve": "CVE-2023-5178",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-5178"
},
{
"cve": "CVE-2023-52425",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-5633",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-5633"
},
{
"cve": "CVE-2023-5717",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-5717"
},
{
"cve": "CVE-2023-6356",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6356"
},
{
"cve": "CVE-2023-6535",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6535"
},
{
"cve": "CVE-2023-6536",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6536"
},
{
"cve": "CVE-2023-6546",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6546"
},
{
"cve": "CVE-2023-6606",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6610",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6610"
},
{
"cve": "CVE-2023-6817",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2023-6931",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-7192",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2023-7192"
},
{
"cve": "CVE-2024-0565",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2024-0565"
},
{
"cve": "CVE-2024-0646",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2024-0646"
},
{
"cve": "CVE-2024-1086",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2024-1086"
},
{
"cve": "CVE-2024-1488",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2024-1488"
},
{
"cve": "CVE-2024-27269",
"product_status": {
"known_affected": [
"T002207",
"T041270",
"T023574",
"T034673"
]
},
"release_date": "2024-05-09T22:00:00.000+00:00",
"title": "CVE-2024-27269"
}
]
}
CNVD-2020-03997
Vulnerability from cnvd - Published: 2020-02-06厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
| Name | Oniguruma Oniguruma 6.*,<6.9.4_rc2 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-19012",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012"
}
},
"description": "Oniguruma\u662f\u652f\u6301\u591a\u79cd\u5b57\u7b26\u7f16\u7801\u7684BSD\u8bb8\u53ef\u7684\u6b63\u5219\u8868\u8fbe\u5f0f\u5e93\u3002\n\nOniguruma\u4e2d\u7684regexec.c\u4e2d\u7684search_in_range\u51fd\u6570\u5b58\u5728\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u7279\u5236\u6b63\u5219\u8868\u8fbe\u5f0f\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8d8a\u754c\u8bfb\u53d6\uff0c\u4ece\u800c\u53ef\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u6216\u4fe1\u606f\u6cc4\u9732\uff0c\u6216\u53ef\u80fd\u9020\u6210\u5176\u4ed6\u5f71\u54cd\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-03997",
"openTime": "2020-02-06",
"patchDescription": "Oniguruma\u662f\u652f\u6301\u591a\u79cd\u5b57\u7b26\u7f16\u7801\u7684BSD\u8bb8\u53ef\u7684\u6b63\u5219\u8868\u8fbe\u5f0f\u5e93\u3002\r\n\r\nOniguruma\u4e2d\u7684regexec.c\u4e2d\u7684search_in_range\u51fd\u6570\u5b58\u5728\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u7279\u5236\u6b63\u5219\u8868\u8fbe\u5f0f\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8d8a\u754c\u8bfb\u53d6\uff0c\u4ece\u800c\u53ef\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u6216\u4fe1\u606f\u6cc4\u9732\uff0c\u6216\u53ef\u80fd\u9020\u6210\u5176\u4ed6\u5f71\u54cd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oniguruma\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Oniguruma Oniguruma 6.*\uff0c\u003c6.9.4_rc2"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012",
"serverity": "\u9ad8",
"submitTime": "2019-11-18",
"title": "Oniguruma\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e"
}
GHSA-5MW9-MR3R-536C
Vulnerability from github – Published: 2022-05-24 17:01 – Updated: 2022-05-24 17:01An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
{
"affected": [],
"aliases": [
"CVE-2019-19012"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-11-17T18:15:00Z",
"severity": "HIGH"
},
"details": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.",
"id": "GHSA-5mw9-mr3r-536c",
"modified": "2022-05-24T17:01:25Z",
"published": "2022-05-24T17:01:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012"
},
{
"type": "WEB",
"url": "https://github.com/kkos/oniguruma/issues/164"
},
{
"type": "WEB",
"url": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"
},
{
"type": "WEB",
"url": "https://github.com/tarantula-team/CVE-2019-19012"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4460-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
RHSA-2024:0409
Vulnerability from csaf_redhat - Published: 2024-01-25 08:01 - Updated: 2026-01-08 02:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for oniguruma is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Oniguruma is a regular expressions library that supports a variety of character encodings. \n\nSecurity Fix(es):\n\n* oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)\n\n* oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)\n\n* oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read (CVE-2019-19012)\n\n* oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)\n\n* oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0409",
"url": "https://access.redhat.com/errata/RHSA-2024:0409"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1728970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728970"
},
{
"category": "external",
"summary": "1768997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768997"
},
{
"category": "external",
"summary": "1802051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802051"
},
{
"category": "external",
"summary": "1802061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802061"
},
{
"category": "external",
"summary": "1802068",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802068"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0409.json"
}
],
"title": "Red Hat Security Advisory: oniguruma security update",
"tracking": {
"current_release_date": "2026-01-08T02:56:53+00:00",
"generator": {
"date": "2026-01-08T02:56:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:0409",
"initial_release_date": "2024-01-25T08:01:45+00:00",
"revision_history": [
{
"date": "2024-01-25T08:01:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-25T08:01:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T02:56:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"product_id": "oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"product_id": "oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_6.i686",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.i686",
"product_id": "oniguruma-0:6.8.2-2.1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"product_id": "oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_6.s390x",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.s390x",
"product_id": "oniguruma-0:6.8.2-2.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_6.src",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.src",
"product_id": "oniguruma-0:6.8.2-2.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13224",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1728970"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Use-after-free in onig_new_deluxe() in regext.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ruby versions are not affected as they used Onigmo, which is a fork of Oniguruma, instead. The Onigmo library doesn\u0027t includes the source code containing the related bug.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-13224"
},
{
"category": "external",
"summary": "RHBZ#1728970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728970"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13224",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13224"
}
],
"release_date": "2019-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T08:01:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0409"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Use-after-free in onig_new_deluxe() in regext.c"
},
{
"cve": "CVE-2019-16163",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2019-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1768997"
}
],
"notes": [
{
"category": "description",
"text": "Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16163"
},
{
"category": "external",
"summary": "RHBZ#1768997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768997"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16163"
}
],
"release_date": "2019-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T08:01:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0409"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c"
},
{
"cve": "CVE-2019-19012",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802051"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability leading to an out-of-bounds read was found in the way Oniguruma handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could crash the application, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affected 32-bit compiled versions of Oniguruma. Therefore it did not affect the following 64-bit versions:\n* PHP and Ruby as shipped with Red Hat Enterprise Linux 7.\n* PHP and Ruby as shipped with Red Hat Software Collections 3.\n* PHP as shipped with Red Hat Enterprise Linux 8.\n* OpenShift containers: openshift4/ose-metering-hadoop, openshift4/ose-metering-hive, openshift4/ose-metering-presto.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19012"
},
{
"category": "external",
"summary": "RHBZ#1802051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012"
}
],
"release_date": "2019-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T08:01:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0409"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read"
},
{
"cve": "CVE-2019-19203",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802061"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was found in the way Oniguruma handled regular expressions with GB18030 character encoding. A UChar pointer is dereferenced without checking if it passed the end of the matched string, leading to a heap-based buffer over-read. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, might crash the application causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw did not affect the versions of Oniguruma (embedded in php) as shipped with Red Hat Enterprise Linux 5, as they did not include support for GB18030 character encoding, which was introduced in a later version of the library.\n\nThe versions of Ruby as shipped with Red Hat Enterprise Linux and Red Hat Software Collections 3 do not use Oniguruma but rather Onigmo, a regular expressions library forked from Oniguruma focusing on new expressions supported in Perl 5.10+. Those versions are affected by this flaw because both Onigmo and Oniguruma share the same vulnerable code. However, Ruby does perform additional checks which prevent the vulnerable code path to be easily reached, hence lowering the severity of the flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19203"
},
{
"category": "external",
"summary": "RHBZ#1802061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19203"
}
],
"release_date": "2019-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T08:01:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0409"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c"
},
{
"cve": "CVE-2019-19204",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802068"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was found in Oniguruma in the way it handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could possibly crash the application, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19204"
},
{
"category": "external",
"summary": "RHBZ#1802068",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802068"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19204"
}
],
"release_date": "2019-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T08:01:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0409"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"AppStream-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.src",
"CRB-8.6.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.i686",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c"
}
]
}
RHSA-2024:0889
Vulnerability from csaf_redhat - Published: 2024-02-20 12:32 - Updated: 2026-01-08 02:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for oniguruma is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Oniguruma is a regular expressions library that supports a variety of character encodings. \n\nSecurity Fix(es):\n\n* oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)\n\n* oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)\n\n* oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read (CVE-2019-19012)\n\n* oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)\n\n* oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0889",
"url": "https://access.redhat.com/errata/RHSA-2024:0889"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1728970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728970"
},
{
"category": "external",
"summary": "1768997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768997"
},
{
"category": "external",
"summary": "1802051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802051"
},
{
"category": "external",
"summary": "1802061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802061"
},
{
"category": "external",
"summary": "1802068",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802068"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0889.json"
}
],
"title": "Red Hat Security Advisory: oniguruma security update",
"tracking": {
"current_release_date": "2026-01-08T02:56:53+00:00",
"generator": {
"date": "2026-01-08T02:56:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:0889",
"initial_release_date": "2024-02-20T12:32:55+00:00",
"revision_history": [
{
"date": "2024-02-20T12:32:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-02-20T12:32:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T02:56:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_9.src",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.src",
"product_id": "oniguruma-0:6.8.2-2.1.el8_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"product_id": "oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"product_id": "oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_9.i686",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.i686",
"product_id": "oniguruma-0:6.8.2-2.1.el8_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"product_id": "oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_9.s390x",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.s390x",
"product_id": "oniguruma-0:6.8.2-2.1.el8_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.i686",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.src",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.i686",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.s390x",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.src",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"relates_to_product_reference": "CRB-8.9.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13224",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1728970"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Use-after-free in onig_new_deluxe() in regext.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ruby versions are not affected as they used Onigmo, which is a fork of Oniguruma, instead. The Onigmo library doesn\u0027t includes the source code containing the related bug.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-13224"
},
{
"category": "external",
"summary": "RHBZ#1728970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728970"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13224",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13224"
}
],
"release_date": "2019-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-20T12:32:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0889"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Use-after-free in onig_new_deluxe() in regext.c"
},
{
"cve": "CVE-2019-16163",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2019-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1768997"
}
],
"notes": [
{
"category": "description",
"text": "Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16163"
},
{
"category": "external",
"summary": "RHBZ#1768997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768997"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16163"
}
],
"release_date": "2019-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-20T12:32:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0889"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c"
},
{
"cve": "CVE-2019-19012",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802051"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability leading to an out-of-bounds read was found in the way Oniguruma handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could crash the application, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affected 32-bit compiled versions of Oniguruma. Therefore it did not affect the following 64-bit versions:\n* PHP and Ruby as shipped with Red Hat Enterprise Linux 7.\n* PHP and Ruby as shipped with Red Hat Software Collections 3.\n* PHP as shipped with Red Hat Enterprise Linux 8.\n* OpenShift containers: openshift4/ose-metering-hadoop, openshift4/ose-metering-hive, openshift4/ose-metering-presto.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19012"
},
{
"category": "external",
"summary": "RHBZ#1802051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012"
}
],
"release_date": "2019-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-20T12:32:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0889"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read"
},
{
"cve": "CVE-2019-19203",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802061"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was found in the way Oniguruma handled regular expressions with GB18030 character encoding. A UChar pointer is dereferenced without checking if it passed the end of the matched string, leading to a heap-based buffer over-read. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, might crash the application causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw did not affect the versions of Oniguruma (embedded in php) as shipped with Red Hat Enterprise Linux 5, as they did not include support for GB18030 character encoding, which was introduced in a later version of the library.\n\nThe versions of Ruby as shipped with Red Hat Enterprise Linux and Red Hat Software Collections 3 do not use Oniguruma but rather Onigmo, a regular expressions library forked from Oniguruma focusing on new expressions supported in Perl 5.10+. Those versions are affected by this flaw because both Onigmo and Oniguruma share the same vulnerable code. However, Ruby does perform additional checks which prevent the vulnerable code path to be easily reached, hence lowering the severity of the flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19203"
},
{
"category": "external",
"summary": "RHBZ#1802061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19203"
}
],
"release_date": "2019-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-20T12:32:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0889"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c"
},
{
"cve": "CVE-2019-19204",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802068"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was found in Oniguruma in the way it handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could possibly crash the application, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19204"
},
{
"category": "external",
"summary": "RHBZ#1802068",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802068"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19204"
}
],
"release_date": "2019-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-20T12:32:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0889"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"AppStream-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"AppStream-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.src",
"CRB-8.9.0.Z.MAIN:oniguruma-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debuginfo-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-debugsource-0:6.8.2-2.1.el8_9.x86_64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.aarch64",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.i686",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.ppc64le",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.s390x",
"CRB-8.9.0.Z.MAIN:oniguruma-devel-0:6.8.2-2.1.el8_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c"
}
]
}
RHSA-2024:0572
Vulnerability from csaf_redhat - Published: 2024-01-30 13:30 - Updated: 2026-01-08 02:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for oniguruma is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Oniguruma is a regular expressions library that supports a variety of character encodings. \n\nSecurity Fix(es):\n\n* oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)\n\n* oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)\n\n* oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read (CVE-2019-19012)\n\n* oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)\n\n* oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0572",
"url": "https://access.redhat.com/errata/RHSA-2024:0572"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1728970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728970"
},
{
"category": "external",
"summary": "1768997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768997"
},
{
"category": "external",
"summary": "1802051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802051"
},
{
"category": "external",
"summary": "1802061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802061"
},
{
"category": "external",
"summary": "1802068",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802068"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0572.json"
}
],
"title": "Red Hat Security Advisory: oniguruma security update",
"tracking": {
"current_release_date": "2026-01-08T02:56:53+00:00",
"generator": {
"date": "2026-01-08T02:56:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:0572",
"initial_release_date": "2024-01-30T13:30:08+00:00",
"revision_history": [
{
"date": "2024-01-30T13:30:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T13:30:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T02:56:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_8.src",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.src",
"product_id": "oniguruma-0:6.8.2-2.1.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"product_id": "oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"product_id": "oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_8.i686",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.i686",
"product_id": "oniguruma-0:6.8.2-2.1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"product_id": "oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "oniguruma-0:6.8.2-2.1.el8_8.s390x",
"product": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.s390x",
"product_id": "oniguruma-0:6.8.2-2.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@6.8.2-2.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"product": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"product_id": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debugsource@6.8.2-2.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"product": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"product_id": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@6.8.2-2.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"product": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"product_id": "oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@6.8.2-2.1.el8_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.src",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:6.8.2-2.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64"
},
"product_reference": "oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64"
},
"product_reference": "oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
},
"product_reference": "oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13224",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1728970"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Use-after-free in onig_new_deluxe() in regext.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Ruby versions are not affected as they used Onigmo, which is a fork of Oniguruma, instead. The Onigmo library doesn\u0027t includes the source code containing the related bug.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-13224"
},
{
"category": "external",
"summary": "RHBZ#1728970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728970"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13224",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13224"
}
],
"release_date": "2019-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:30:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0572"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Use-after-free in onig_new_deluxe() in regext.c"
},
{
"cve": "CVE-2019-16163",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2019-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1768997"
}
],
"notes": [
{
"category": "description",
"text": "Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16163"
},
{
"category": "external",
"summary": "RHBZ#1768997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768997"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16163"
}
],
"release_date": "2019-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:30:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0572"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c"
},
{
"cve": "CVE-2019-19012",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802051"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability leading to an out-of-bounds read was found in the way Oniguruma handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could crash the application, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affected 32-bit compiled versions of Oniguruma. Therefore it did not affect the following 64-bit versions:\n* PHP and Ruby as shipped with Red Hat Enterprise Linux 7.\n* PHP and Ruby as shipped with Red Hat Software Collections 3.\n* PHP as shipped with Red Hat Enterprise Linux 8.\n* OpenShift containers: openshift4/ose-metering-hadoop, openshift4/ose-metering-hive, openshift4/ose-metering-presto.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19012"
},
{
"category": "external",
"summary": "RHBZ#1802051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012"
}
],
"release_date": "2019-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:30:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0572"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read"
},
{
"cve": "CVE-2019-19203",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802061"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was found in the way Oniguruma handled regular expressions with GB18030 character encoding. A UChar pointer is dereferenced without checking if it passed the end of the matched string, leading to a heap-based buffer over-read. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, might crash the application causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw did not affect the versions of Oniguruma (embedded in php) as shipped with Red Hat Enterprise Linux 5, as they did not include support for GB18030 character encoding, which was introduced in a later version of the library.\n\nThe versions of Ruby as shipped with Red Hat Enterprise Linux and Red Hat Software Collections 3 do not use Oniguruma but rather Onigmo, a regular expressions library forked from Oniguruma focusing on new expressions supported in Perl 5.10+. Those versions are affected by this flaw because both Onigmo and Oniguruma share the same vulnerable code. However, Ruby does perform additional checks which prevent the vulnerable code path to be easily reached, hence lowering the severity of the flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19203"
},
{
"category": "external",
"summary": "RHBZ#1802061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19203"
}
],
"release_date": "2019-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:30:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0572"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c"
},
{
"cve": "CVE-2019-19204",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802068"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was found in Oniguruma in the way it handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could possibly crash the application, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19204"
},
{
"category": "external",
"summary": "RHBZ#1802068",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802068"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19204"
}
],
"release_date": "2019-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:30:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0572"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"AppStream-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.src",
"CRB-8.8.0.Z.EUS:oniguruma-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debuginfo-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-debugsource-0:6.8.2-2.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.i686",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:oniguruma-devel-0:6.8.2-2.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c"
}
]
}
RHSA-2025:7539
Vulnerability from csaf_redhat - Published: 2025-05-14 02:21 - Updated: 2025-11-21 19:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the ruby:2.5 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read (CVE-2019-19012)\n\n* rubygem-bundler: unexpected code execution in Gemfiles (CVE-2021-43809)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:7539",
"url": "https://access.redhat.com/errata/RHSA-2025:7539"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1802051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802051"
},
{
"category": "external",
"summary": "2035260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035260"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_7539.json"
}
],
"title": "Red Hat Security Advisory: ruby:2.5 security update",
"tracking": {
"current_release_date": "2025-11-21T19:35:41+00:00",
"generator": {
"date": "2025-11-21T19:35:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:7539",
"initial_release_date": "2025-05-14T02:21:28+00:00",
"revision_history": [
{
"date": "2025-05-14T02:21:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-05-14T02:21:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:35:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl-debuginfo@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5)",
"product_id": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=i686\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"product": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src (ruby:2.5)",
"product_id": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=src\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"product": {
"name": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src (ruby:2.5)",
"product_id": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-abrt@0.3.0-4.module%2Bel8.10.0%2B22021%2B135c76a8?arch=src\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"product": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src (ruby:2.5)",
"product_id": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=src\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"product": {
"name": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src (ruby:2.5)",
"product_id": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bundler@1.16.1-5.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=src\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"product": {
"name": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src (ruby:2.5)",
"product_id": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mongo@2.5.1-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=src\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"product": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src (ruby:2.5)",
"product_id": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=src\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"product": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src (ruby:2.5)",
"product_id": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=src\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-debuginfo@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-debugsource@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl-debuginfo@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product": {
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5)",
"product_id": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5)",
"product_id": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=x86_64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-doc@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"product": {
"name": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch (ruby:2.5)",
"product_id": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-abrt@0.3.0-4.module%2Bel8.10.0%2B22021%2B135c76a8?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"product": {
"name": "rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch (ruby:2.5)",
"product_id": "rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-abrt-doc@0.3.0-4.module%2Bel8.10.0%2B22021%2B135c76a8?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product": {
"name": "rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch (ruby:2.5)",
"product_id": "rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-doc@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bundler@1.16.1-5.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bundler-doc@1.16.1-5.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-did_you_mean@1.2.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-minitest@5.10.3-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product": {
"name": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch (ruby:2.5)",
"product_id": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mongo@2.5.1-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product": {
"name": "rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch (ruby:2.5)",
"product_id": "rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mongo-doc@2.5.1-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product": {
"name": "rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch (ruby:2.5)",
"product_id": "rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-doc@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-net-telnet@0.1.1-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product": {
"name": "rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch (ruby:2.5)",
"product_id": "rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-doc@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-power_assert@1.1.1-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rake@12.3.3-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rdoc@6.0.1.1-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-test-unit@3.2.7-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-xmlrpc@0.3.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygems@2.7.6.3-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product": {
"name": "rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5)",
"product_id": "rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygems-devel@2.7.6.3-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=noarch\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-debuginfo@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-debugsource@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl-debuginfo@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product": {
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5)",
"product_id": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5)",
"product_id": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=aarch64\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-debuginfo@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-debugsource@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl-debuginfo@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5)",
"product_id": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5)",
"product_id": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=ppc64le\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@2.5.9-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@1.3.4-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-debuginfo@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bson-debugsource@4.3.0-2.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.4.6-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.1.0-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.4.10-4.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-openssl-debuginfo@2.1.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product": {
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x (ruby:2.5)",
"product_id": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.0.0-3.module%2Bel8.9.0%2B19193%2B435404ae?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5)",
"product_id": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.0.2-114.module%2Bel8.10.0%2B23088%2B750dc6ca?arch=s390x\u0026rpmmod=ruby:2.5:8100020250506105643:489197e6"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5"
},
"product_reference": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5"
},
"product_reference": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5"
},
"product_reference": "rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5"
},
"product_reference": "rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5"
},
"product_reference": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5"
},
"product_reference": "rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5"
},
"product_reference": "rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5"
},
"product_reference": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5"
},
"product_reference": "rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5"
},
"product_reference": "rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5"
},
"product_reference": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5"
},
"product_reference": "rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5"
},
"product_reference": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5"
},
"product_reference": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5"
},
"product_reference": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5"
},
"product_reference": "rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5"
},
"product_reference": "rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5"
},
"product_reference": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5"
},
"product_reference": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5"
},
"product_reference": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5"
},
"product_reference": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64 (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5"
},
"product_reference": "rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch (ruby:2.5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
},
"product_reference": "rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-19012",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802051"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability leading to an out-of-bounds read was found in the way Oniguruma handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could crash the application, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affected 32-bit compiled versions of Oniguruma. Therefore it did not affect the following 64-bit versions:\n* PHP and Ruby as shipped with Red Hat Enterprise Linux 7.\n* PHP and Ruby as shipped with Red Hat Software Collections 3.\n* PHP as shipped with Red Hat Enterprise Linux 8.\n* OpenShift containers: openshift4/ose-metering-hadoop, openshift4/ose-metering-hive, openshift4/ose-metering-presto.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19012"
},
{
"category": "external",
"summary": "RHBZ#1802051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19012"
}
],
"release_date": "2019-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-14T02:21:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7539"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read"
},
{
"cve": "CVE-2021-43809",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2021-12-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035260"
}
],
"notes": [
{
"category": "description",
"text": "`Bundler` is a package for managing application dependencies in Ruby. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`\u0027s, it is not expected that they lead to execution of external code, unless that\u0027s explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash.\n\nTo exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the upload-pack argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside.\n\nThis vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, the exploitability is very low, because it requires a lot of user interaction. Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`\u0027s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-bundler: unexpected code execution in Gemfiles",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43809"
},
{
"category": "external",
"summary": "RHBZ#2035260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43809"
}
],
"release_date": "2021-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-14T02:21:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7539"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-irb-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.3.0-4.module+el8.10.0+22021+135c76a8.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.3.0-4.module+el8.10.0+22021+135c76a8.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:1.3.4-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debuginfo-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-debugsource-0:4.3.0-2.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bson-doc-0:4.3.0-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-doc-0:1.16.1-5.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-did_you_mean-0:1.2.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.4.6-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.1.0-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.10.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-0:2.5.1-2.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mongo-doc-0:2.5.1-2.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.4.10-4.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-net-telnet-0:0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-openssl-debuginfo-0:2.1.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.src::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.0.0-3.module+el8.9.0+19193+435404ae.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.0.0-3.module+el8.9.0+19193+435404ae.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:1.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.aarch64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.i686::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.ppc64le::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.s390x::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:3.0.2-114.module+el8.10.0+23088+750dc6ca.x86_64::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:12.3.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.2.7-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-xmlrpc-0:0.3.0-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca.noarch::ruby:2.5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-bundler: unexpected code execution in Gemfiles"
}
]
}
OPENSUSE-SU-2024:11111-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libonig5-6.9.7.1-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libonig5-6.9.7.1-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11111",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11111-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13224 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13225 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19012 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19203 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19204 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19246 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19246/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26159 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26159/"
}
],
"title": "libonig5-6.9.7.1-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11111-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libonig5-6.9.7.1-1.2.aarch64",
"product": {
"name": "libonig5-6.9.7.1-1.2.aarch64",
"product_id": "libonig5-6.9.7.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "oniguruma-devel-6.9.7.1-1.2.aarch64",
"product": {
"name": "oniguruma-devel-6.9.7.1-1.2.aarch64",
"product_id": "oniguruma-devel-6.9.7.1-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libonig5-6.9.7.1-1.2.ppc64le",
"product": {
"name": "libonig5-6.9.7.1-1.2.ppc64le",
"product_id": "libonig5-6.9.7.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "oniguruma-devel-6.9.7.1-1.2.ppc64le",
"product": {
"name": "oniguruma-devel-6.9.7.1-1.2.ppc64le",
"product_id": "oniguruma-devel-6.9.7.1-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libonig5-6.9.7.1-1.2.s390x",
"product": {
"name": "libonig5-6.9.7.1-1.2.s390x",
"product_id": "libonig5-6.9.7.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "oniguruma-devel-6.9.7.1-1.2.s390x",
"product": {
"name": "oniguruma-devel-6.9.7.1-1.2.s390x",
"product_id": "oniguruma-devel-6.9.7.1-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libonig5-6.9.7.1-1.2.x86_64",
"product": {
"name": "libonig5-6.9.7.1-1.2.x86_64",
"product_id": "libonig5-6.9.7.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "oniguruma-devel-6.9.7.1-1.2.x86_64",
"product": {
"name": "oniguruma-devel-6.9.7.1-1.2.x86_64",
"product_id": "oniguruma-devel-6.9.7.1-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libonig5-6.9.7.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64"
},
"product_reference": "libonig5-6.9.7.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libonig5-6.9.7.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le"
},
"product_reference": "libonig5-6.9.7.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libonig5-6.9.7.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x"
},
"product_reference": "libonig5-6.9.7.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libonig5-6.9.7.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64"
},
"product_reference": "libonig5-6.9.7.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-6.9.7.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64"
},
"product_reference": "oniguruma-devel-6.9.7.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-6.9.7.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le"
},
"product_reference": "oniguruma-devel-6.9.7.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-6.9.7.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x"
},
"product_reference": "oniguruma-devel-6.9.7.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-6.9.7.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
},
"product_reference": "oniguruma-devel-6.9.7.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13224"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13224",
"url": "https://www.suse.com/security/cve/CVE-2019-13224"
},
{
"category": "external",
"summary": "SUSE Bug 1142847 for CVE-2019-13224",
"url": "https://bugzilla.suse.com/1142847"
},
{
"category": "external",
"summary": "SUSE Bug 1203568 for CVE-2019-13224",
"url": "https://bugzilla.suse.com/1203568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-13224"
},
{
"cve": "CVE-2019-13225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13225"
}
],
"notes": [
{
"category": "general",
"text": "A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression. Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13225",
"url": "https://www.suse.com/security/cve/CVE-2019-13225"
},
{
"category": "external",
"summary": "SUSE Bug 1141157 for CVE-2019-13225",
"url": "https://bugzilla.suse.com/1141157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-13225"
},
{
"cve": "CVE-2019-19012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19012"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19012",
"url": "https://www.suse.com/security/cve/CVE-2019-19012"
},
{
"category": "external",
"summary": "SUSE Bug 1156984 for CVE-2019-19012",
"url": "https://bugzilla.suse.com/1156984"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19012"
},
{
"cve": "CVE-2019-19203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19203"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19203",
"url": "https://www.suse.com/security/cve/CVE-2019-19203"
},
{
"category": "external",
"summary": "SUSE Bug 1164550 for CVE-2019-19203",
"url": "https://bugzilla.suse.com/1164550"
},
{
"category": "external",
"summary": "SUSE Bug 1203568 for CVE-2019-19203",
"url": "https://bugzilla.suse.com/1203568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-19203"
},
{
"cve": "CVE-2019-19204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19204"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19204",
"url": "https://www.suse.com/security/cve/CVE-2019-19204"
},
{
"category": "external",
"summary": "SUSE Bug 1164569 for CVE-2019-19204",
"url": "https://bugzilla.suse.com/1164569"
},
{
"category": "external",
"summary": "SUSE Bug 1203568 for CVE-2019-19204",
"url": "https://bugzilla.suse.com/1203568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-19204"
},
{
"cve": "CVE-2019-19246",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19246"
}
],
"notes": [
{
"category": "general",
"text": "Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19246",
"url": "https://www.suse.com/security/cve/CVE-2019-19246"
},
{
"category": "external",
"summary": "SUSE Bug 1157805 for CVE-2019-19246",
"url": "https://bugzilla.suse.com/1157805"
},
{
"category": "external",
"summary": "SUSE Bug 1203568 for CVE-2019-19246",
"url": "https://bugzilla.suse.com/1203568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-19246"
},
{
"cve": "CVE-2020-26159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26159"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26159",
"url": "https://www.suse.com/security/cve/CVE-2020-26159"
},
{
"category": "external",
"summary": "SUSE Bug 1177179 for CVE-2020-26159",
"url": "https://bugzilla.suse.com/1177179"
},
{
"category": "external",
"summary": "SUSE Bug 1203568 for CVE-2020-26159",
"url": "https://bugzilla.suse.com/1203568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:libonig5-6.9.7.1-1.2.x86_64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.aarch64",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.ppc64le",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.s390x",
"openSUSE Tumbleweed:oniguruma-devel-6.9.7.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26159"
}
]
}
GSD-2019-19012
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-19012",
"description": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.",
"id": "GSD-2019-19012",
"references": [
"https://www.suse.com/security/cve/CVE-2019-19012.html",
"https://ubuntu.com/security/CVE-2019-19012",
"https://advisories.mageia.org/CVE-2019-19012.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-19012"
],
"details": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.",
"id": "GSD-2019-19012",
"modified": "2023-12-13T01:23:53.760030Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-19012",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/kkos/oniguruma/issues/164",
"refsource": "MISC",
"url": "https://github.com/kkos/oniguruma/issues/164"
},
{
"name": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2",
"refsource": "MISC",
"url": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"
},
{
"name": "https://github.com/tarantula-team/CVE-2019-19012",
"refsource": "MISC",
"url": "https://github.com/tarantula-team/CVE-2019-19012"
},
{
"name": "FEDORA-2019-d942abd0d4",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"
},
{
"name": "[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"
},
{
"name": "FEDORA-2019-73197ff9a0",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"
},
{
"name": "USN-4460-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4460-1/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.9.3",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oniguruma_project:oniguruma:6.9.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-19012"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-190"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"
},
{
"name": "https://github.com/kkos/oniguruma/issues/164",
"refsource": "MISC",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kkos/oniguruma/issues/164"
},
{
"name": "https://github.com/tarantula-team/CVE-2019-19012",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tarantula-team/CVE-2019-19012"
},
{
"name": "FEDORA-2019-d942abd0d4",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"
},
{
"name": "[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"
},
{
"name": "FEDORA-2019-73197ff9a0",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"
},
{
"name": "USN-4460-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/4460-1/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-08-24T17:37Z",
"publishedDate": "2019-11-17T18:15Z"
}
}
}
CERTFR-2024-AVI-0459
Vulnerability from certfr_avis - Published: 2024-05-31 - Updated: 2024-05-31
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions postérieures à 3.5 et antérieures à 4.8.5 | ||
| IBM | N/A | DevOps Code ClearCase versions 11.0.x sans le dernier correctif de sécurité | ||
| IBM | N/A | Rational ClearCase versions 9.1.x et 10.0.0.x sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions post\u00e9rieures \u00e0 3.5 et ant\u00e9rieures \u00e0 4.8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DevOps Code ClearCase versions 11.0.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Rational ClearCase versions 9.1.x et 10.0.0.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2023-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49568"
},
{
"name": "CVE-2024-25030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25030"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2023-52296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52296"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2024-25046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25046"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2022-1996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1996"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2020-10650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10650"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2018-1313",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1313"
},
{
"name": "CVE-2022-46337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46337"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2024-27254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27254"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2015-1832",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1832"
},
{
"name": "CVE-2021-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2024-22360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22360"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2023-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38729"
},
{
"name": "CVE-2024-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21626"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2023-261257",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-261257"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2023-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49569"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2024-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0690"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2012-2677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2677"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"initial_release_date": "2024-05-31T00:00:00",
"last_revision_date": "2024-05-31T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0459",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-05-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7155114",
"url": "https://www.ibm.com/support/pages/node/7155114"
},
{
"published_at": "2024-05-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7155078",
"url": "https://www.ibm.com/support/pages/node/7155078"
}
]
}
CERTFR-2024-AVI-0385
Vulnerability from certfr_avis - Published: 2024-05-10 - Updated: 2024-05-10
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.23 | ||
| IBM | N/A | AIX et VIOS sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions antérieures à 6.1.0.24 | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.4.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF02 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX et VIOS sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions ant\u00e9rieures \u00e0 6.1.0.24",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF02",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2024-27273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27273"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2023-44794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44794"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
}
],
"initial_release_date": "2024-05-10T00:00:00",
"last_revision_date": "2024-05-10T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150297 du 06 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150297"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150684 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150684"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150803 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150277 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150277"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150196 du 03 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150798 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150804 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150799 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150276 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150276"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150802 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150362 du 07 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150362"
}
]
}
CERTFR-2024-AVI-0305
Vulnerability from certfr_avis - Published: 2024-04-12 - Updated: 2024-04-12
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Sterling Connect:Direct pour UNIX versions 6.1.0.x antérieures à 6.1.0.4.iFix104
- Sterling Connect:Direct pour UNIX versions 6.0.0.x antérieures à 6.0.0.2.iFix163
- Sterling Connect:Direct FTP+ versions antérieures à 1.3.0 sans le correctif de sécurité iFix026
- QRadar App SDK versions 2.2.x antérieures à 2.2.1
- QRadar Deployment Intelligence App versions antérieures à 3.0.13
- Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.20.0
- QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF01
- QRadar Suite Software versions 1.10.12.x antérieures à 1.10.20.0
- WebSphere Application Server Liberty versions postérieures à 21.0.0.2 et antérieures à 24.0.0.4
- WebSphere Application Server versions 9.x antérieures à 9.0.5.19
- WebSphere Application Server versions postérieures à 8.5.5.2 antérieures à 8.5.5.26
- Sterling B2B Integrator versions 6.0.x.x à 6.1.x.x antérieures à 6.1.2.5
- Sterling B2B Integrator versions 6.2.x.x antérieures à 6.2.0.1
Se référer aux bulletin de l'éditeur pour les versions des fichiers vulnérables (cf. section Documentation).
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.1.0.x ant\u00e9rieures \u00e0\u00a06.1.0.4.iFix104\u003c/li\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.0.2.iFix163\u003c/li\u003e \u003cli\u003eSterling Connect:Direct FTP+ versions ant\u00e9rieures \u00e0 1.3.0 sans le correctif de s\u00e9curit\u00e9 iFix026\u003c/li\u003e \u003cli\u003eQRadar App SDK versions 2.2.x ant\u00e9rieures \u00e0 2.2.1\u003c/li\u003e \u003cli\u003eQRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.13\u003c/li\u003e \u003cli\u003eCloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eQRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF01\u003c/li\u003e \u003cli\u003eQRadar Suite Software versions 1.10.12.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eWebSphere Application Server Liberty versions post\u00e9rieures \u00e0 21.0.0.2 et ant\u00e9rieures \u00e0 24.0.0.4\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions 9.x ant\u00e9rieures \u00e0 9.0.5.19\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions post\u00e9rieures \u00e0 8.5.5.2 ant\u00e9rieures \u00e0 8.5.5.26\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.0.x.x \u00e0 6.1.x.x ant\u00e9rieures \u00e0 6.1.2.5\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux bulletin de l\u0027\u00e9diteur pour les versions des fichiers vuln\u00e9rables (cf. section Documentation).\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2012-0881",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0881"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2020-28241",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-46363",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46363"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-30468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30468"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2023-42794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42794"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2022-41721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
},
{
"name": "CVE-2022-42920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42920"
},
{
"name": "CVE-2022-23437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23437"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2011-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2023-34966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2012-6708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2024-22234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22234"
}
],
"initial_release_date": "2024-04-12T00:00:00",
"last_revision_date": "2024-04-12T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0305",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147813 du 09 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147813"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148062 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148062"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147943 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147943"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147903 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147903"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148094 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148094"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148151 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148151"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148066 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148066"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148158 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148158"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147727 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147727"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148065 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148065"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148068 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148068"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147728 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147728"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147944 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147944"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147726 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147726"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147923 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147923"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147812 du 09 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147812"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148063 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148063"
}
]
}
CERTFR-2024-AVI-0923
Vulnerability from certfr_avis - Published: 2024-10-25 - Updated: 2024-10-25
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling Connect:Express pour UNIX versions 1.5.x antérieures à 1.5.0.17010 | ||
| IBM | QRadar | QRadar Assistant versions antérieures à 3.8.1 | ||
| IBM | Cognos Analytics | Cognos Analytics Mobile (Android) versions 1.1.x antérieures à 1.1.20 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.0.x antérieures à 6.0.3.1 GA | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.5.0 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 GA | ||
| IBM | Cognos Analytics | Cognos Analytics Mobile (iOS) versions 1.1.x antérieures à 1.1.20 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 GA |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Express pour UNIX versions 1.5.x ant\u00e9rieures \u00e0 1.5.0.17010",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Assistant versions ant\u00e9rieures \u00e0 3.8.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics Mobile (Android) versions 1.1.x ant\u00e9rieures \u00e0 1.1.20",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.5.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 ",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics Mobile (iOS) versions 1.1.x ant\u00e9rieures \u00e0 1.1.20",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0144"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-25166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25166"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-28856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28856"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2018-12538",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12538"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2023-38737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38737"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2022-36943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36943"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38009"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2020-27216",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27216"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-29622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29622"
},
{
"name": "CVE-2021-40690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40690"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-45145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45145"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2023-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0842"
},
{
"name": "CVE-2023-22467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-43383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43383"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2018-12545",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12545"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2024-41784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41784"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2022-24834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24834"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2022-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0235"
},
{
"name": "CVE-2019-10241",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10241"
},
{
"name": "CVE-2022-24736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24736"
},
{
"name": "CVE-2024-25042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25042"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2020-15168",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15168"
},
{
"name": "CVE-2023-29262",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29262"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2022-24735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24735"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2012-2677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2677"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2021-34428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34428"
}
],
"initial_release_date": "2024-10-25T00:00:00",
"last_revision_date": "2024-10-25T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0923",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173631",
"url": "https://www.ibm.com/support/pages/node/7173631"
},
{
"published_at": "2024-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174016",
"url": "https://www.ibm.com/support/pages/node/7174016"
},
{
"published_at": "2024-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174015",
"url": "https://www.ibm.com/support/pages/node/7174015"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173632",
"url": "https://www.ibm.com/support/pages/node/7173632"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172691",
"url": "https://www.ibm.com/support/pages/node/7172691"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172692",
"url": "https://www.ibm.com/support/pages/node/7172692"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173592",
"url": "https://www.ibm.com/support/pages/node/7173592"
},
{
"published_at": "2024-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173866",
"url": "https://www.ibm.com/support/pages/node/7173866"
}
]
}
CERTFR-2024-AVI-0506
Vulnerability from certfr_avis - Published: 2024-06-19 - Updated: 2024-06-19
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP8 IF03 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP8 IF03",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2019-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15505"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-40551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40551"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-45863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-6915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6915"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-37453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37453"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2023-39193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39193"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2024-22243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22243"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2024-28784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28784"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-50961",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50961"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2024-26609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26609"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2001-1267",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1267"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2024-22262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22262"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39189"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2023-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38409"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-28241",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3758"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-40546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40546"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-28464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28464"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2023-52580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52580"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2023-52574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52574"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-31083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31083"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2023-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6176"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2023-25012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25012"
},
{
"name": "CVE-2022-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0500"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-39192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39192"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2023-39194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39194"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2023-40549",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40549"
},
{
"name": "CVE-2023-1513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1513"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2011-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-40548",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40548"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2024-22259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22259"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2023-34966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2022-26377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
},
{
"name": "CVE-2023-52581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52581"
},
{
"name": "CVE-2023-40550",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40550"
},
{
"name": "CVE-2019-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13631"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-42755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42755"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2023-50960",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50960"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-25775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25775"
},
{
"name": "CVE-2012-6708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2023-6622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6622"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-40547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40547"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-42754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42754"
}
],
"initial_release_date": "2024-06-19T00:00:00",
"last_revision_date": "2024-06-19T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0506",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2024-06-19",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82681",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP8-IF03"
}
]
}
FKIE_CVE-2019-19012
Vulnerability from fkie_nvd - Published: 2019-11-17 18:15 - Updated: 2024-11-21 04:33| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/kkos/oniguruma/issues/164 | Exploit, Patch, Third Party Advisory | |
| cve@mitre.org | https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2 | Third Party Advisory | |
| cve@mitre.org | https://github.com/tarantula-team/CVE-2019-19012 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html | Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/ | ||
| cve@mitre.org | https://usn.ubuntu.com/4460-1/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/kkos/oniguruma/issues/164 | Exploit, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/tarantula-team/CVE-2019-19012 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4460-1/ |
| Vendor | Product | Version | |
|---|---|---|---|
| oniguruma_project | oniguruma | * | |
| oniguruma_project | oniguruma | 6.9.4 | |
| debian | debian_linux | 8.0 | |
| fedoraproject | fedora | 30 | |
| fedoraproject | fedora | 31 | |
| redhat | enterprise_linux | 8.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBFDAD06-A3DB-4161-9B88-D384E641705B",
"versionEndIncluding": "6.9.3",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oniguruma_project:oniguruma:6.9.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0515AAEB-AD17-4E7F-91DE-D9FEC0C1602D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression."
},
{
"lang": "es",
"value": "Un desbordamiento de enteros en la funci\u00f3n search_in_range en el archivo regexec.c en Oniguruma versiones 6.x anteriores a 6.9.4_rc2, conduce a una lectura fuera de l\u00edmites, en la que el desplazamiento de esta lectura est\u00e1 bajo el control de un atacante. (Esto solo afecta a la versi\u00f3n compilada de 32 bits). Los atacantes remotos pueden causar una denegaci\u00f3n de servicio o una divulgaci\u00f3n de informaci\u00f3n, o posiblemente tener otro impacto no especificado, por medio de una expresi\u00f3n regular especialmente dise\u00f1ada."
}
],
"id": "CVE-2019-19012",
"lastModified": "2024-11-21T04:33:59.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-17T18:15:11.440",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kkos/oniguruma/issues/164"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tarantula-team/CVE-2019-19012"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/4460-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kkos/oniguruma/issues/164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tarantula-team/CVE-2019-19012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/4460-1/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.